One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Estimating insurance premia from data is a difficult regression problem for several reasons: the large number of variables, many of which are discrete, and the very peculiar shape...
Nicolas Chapados, Yoshua Bengio, Pascal Vincent, J...
Finite-domain constraint programming can be used to solve a wide range of problems by first modelling the problem as a set of constraints that characterise the problem’s solutio...
Copyright 2005 IEEE. Published in the 2006 International Conference on Image Processing (ICIP-2006), October 8-11, 2006, Atlanta, Georgia. Personal use of this material is permitt...
Sangho Yoon, Michael Harville, H. Harlyn Baker, Ni...
In this paper we extend the control methodology based on Extended Markov Tracking (EMT) by providing the control algorithm with capabilities to calibrate and even partially recons...