Sciweavers

1253 search results - page 140 / 251
» Exploration Testing
Sort
View
126
Voted
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 8 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
144
Voted
ICRA
2002
IEEE
136views Robotics» more  ICRA 2002»
15 years 7 months ago
Motion Dynamics of a Rover with Slip-Based Traction Model
This paper investigates kinetic behavior of a planetary rover with attention to tire-soil traction mechanics and articulated body dynamics, and thereby study the control when the ...
Kazuya Yoshida, Hiroshida Hamano
121
Voted
BMCBI
2010
175views more  BMCBI 2010»
15 years 2 months ago
Saliva Ontology: An ontology-based framework for a Salivaomics Knowledge Base
Background: The Salivaomics Knowledge Base (SKB) is designed to serve as a computational infrastructure that can permit global exploration and utilization of data and information ...
Jiye Ai, Barry Smith, Wong T. David
JFR
2007
163views more  JFR 2007»
15 years 2 months ago
Real-time localization and elevation mapping within urban search and rescue scenarios
Urban Search And Rescue (USAR) is a time critical task. Rescue teams have to explore a large terrain within a short amount of time in order to locate survivors after a disaster. O...
Alexander Kleiner, Christian Dornhege
120
Voted
ATAL
2009
Springer
15 years 9 months ago
Generalized model learning for reinforcement learning in factored domains
Improving the sample efficiency of reinforcement learning algorithms to scale up to larger and more realistic domains is a current research challenge in machine learning. Model-ba...
Todd Hester, Peter Stone