Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...
Abstract. The utilization of pseudo-random proportional rule to balance between the exploitation and exploration of the search process was shown in Ant Colony System (ACS) algorith...
— This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wish...
Lifeng Lai, Hesham El Gamal, Hai Jiang, H. Vincent...
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
Abstract. We propose a unified ubiHome application service model which provides user-centered services by exploiting intelligent context-awareness. Recently, most of research relat...