Sciweavers

1455 search results - page 245 / 291
» Exploiting Myopic Learning
Sort
View
DIMVA
2008
15 years 4 months ago
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks
Abstract. This paper focuses on defense mechanisms for cross-site scripting attacks, the top threat on web applications today. It is believed that input validation (or filtering) c...
Prithvi Bisht, V. N. Venkatakrishnan
LREC
2010
152views Education» more  LREC 2010»
15 years 4 months ago
Predicting Persuasiveness in Political Discourses
In political speeches, the audience tends to react or resonate to signals of persuasive communication, including an expected theme, a name or an expression. Automatically predicti...
Carlo Strapparava, Marco Guerini, Oliviero Stock
132
Voted
ICAI
2008
15 years 4 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
IJCAI
2007
15 years 4 months ago
Depth Estimation Using Monocular and Stereo Cues
Depth estimation in computer vision and robotics is most commonly done via stereo vision (stereopsis), in which images from two cameras are used to triangulate and estimate distan...
Ashutosh Saxena, Jamie Schulte, Andrew Y. Ng
IJCAI
2007
15 years 4 months ago
Using Linear Programming for Bayesian Exploration in Markov Decision Processes
A key problem in reinforcement learning is finding a good balance between the need to explore the environment and the need to gain rewards by exploiting existing knowledge. Much ...
Pablo Samuel Castro, Doina Precup