Sciweavers

151 search results - page 28 / 31
» Automating System Tests Using Declarative Virtual Machines
Sort
View
130
Voted
FLAIRS
2007
15 years 6 months ago
Guiding Inference with Policy Search Reinforcement Learning
Symbolic reasoning is a well understood and effective approach to handling reasoning over formally represented knowledge; however, simple symbolic inference systems necessarily sl...
Matthew E. Taylor, Cynthia Matuszek, Pace Reagan S...
151
Voted
BTW
2007
Springer
236views Database» more  BTW 2007»
15 years 8 months ago
A Classification of Schema Mappings and Analysis of Mapping Tools
: Schema mapping techniques for data exchange have become popular and useful tools both in research and industry. A schema mapping relates a source schema with a target schema via ...
Frank Legler, Felix Naumann
124
Voted
OOPSLA
2007
Springer
15 years 10 months ago
Probabilistic calling context
Calling context enhances program understanding and dynamic analyses by providing a rich representation of program location. Compared to imperative programs, objectoriented program...
Michael D. Bond, Kathryn S. McKinley
156
Voted
VIZSEC
2004
Springer
15 years 10 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
133
Voted
IPPS
2007
IEEE
15 years 11 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...