Sciweavers

3604 search results - page 614 / 721
» All Common Subsequences
Sort
View
SECON
2007
IEEE
15 years 10 months ago
A Mechanism for Detecting and Responding to Misbehaving Nodes in Wireless Networks
Abstract—While mechanisms exist to instantiate common security functionality such as confidentiality and integrity, little has been done to define a mechanism for identificati...
Damon McCoy, Douglas C. Sicker, Dirk Grunwald
109
Voted
WISE
2007
Springer
15 years 10 months ago
Web Accessibility Evaluation Via XSLT
Web accessibility rules, i.e., the conditions to be met by Web sites in order to be considered accessible for all, can be (partially) checked automatically in many different ways....
Vicente Luque Centeno, Carlos Delgado Kloos, Jos&e...
ASIAN
2007
Springer
102views Algorithms» more  ASIAN 2007»
15 years 10 months ago
A Static Birthmark of Binary Executables Based on API Call Structure
Abstract. A software birthmark is a unique characteristic of a program that can be used as a software theft detection. In this paper we suggest and empirically evaluate a static bi...
Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Ha...
ATAL
2007
Springer
15 years 10 months ago
The IEEE FIPA approach to integrating software agents and web services
In many settings Web services are now perceived as the first choice technology to provide neatly encapsulated functionality for Web-based computation. To date, many standards hav...
Dominic Greenwood, Margaret Lyell, Ashok U. Mallya...
143
Voted
ATAL
2007
Springer
15 years 10 months ago
Batch reinforcement learning in a complex domain
Temporal difference reinforcement learning algorithms are perfectly suited to autonomous agents because they learn directly from an agent’s experience based on sequential actio...
Shivaram Kalyanakrishnan, Peter Stone