Sciweavers

5675 search results - page 94 / 1135
» Exploiting Chaos for Computation
Sort
View
IMC
2006
ACM
15 years 4 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
AAIM
2005
Springer
110views Algorithms» more  AAIM 2005»
15 years 3 months ago
Dynamically Updating the Exploiting Parameter in Improving Performance of Ant-Based Algorithms
Abstract. The utilization of pseudo-random proportional rule to balance between the exploitation and exploration of the search process was shown in Ant Colony System (ACS) algorith...
Hoang Trung Dinh, Abdullah Al Mamun, Hieu T. Dinh
TMC
2011
137views more  TMC 2011»
14 years 5 months ago
Cognitive Medium Access: Exploration, Exploitation, and Competition
— This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wish...
Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent...
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
15 years 3 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
UCS
2004
Springer
15 years 3 months ago
A Unified Application Service Model for ubiHome by Exploiting Intelligent Context-Awareness
Abstract. We propose a unified ubiHome application service model which provides user-centered services by exploiting intelligent context-awareness. Recently, most of research relat...
Yoosoo Oh, Woontack Woo