Sciweavers

7064 search results - page 1314 / 1413
» From States to Histories
Sort
View
ATAL
2007
Springer
15 years 6 months ago
Multiagent reinforcement learning and self-organization in a network of agents
To cope with large scale, agents are usually organized in a network such that an agent interacts only with its immediate neighbors in the network. Reinforcement learning technique...
Sherief Abdallah, Victor R. Lesser
CCS
2007
ACM
15 years 6 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu
CCS
2007
ACM
15 years 6 months ago
Improving vulnerability discovery models
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
Andy Ozment
CIVR
2007
Springer
210views Image Analysis» more  CIVR 2007»
15 years 6 months ago
Semantic video analysis for psychological research on violence in computer games
In this paper, we present an automatic semantic video analysis system to support interdisciplinary research efforts in the field of psychology and media science. The psychological...
Markus Mühling, Ralph Ewerth, Thilo Stadelman...
CSR
2007
Springer
15 years 6 months ago
Proving Church's Thesis
t) Yuri Gurevich Microsoft Research The talk reflects recent joint work with Nachum Dershowitz [4]. In 1936, Church suggested that the recursive functions, which had been defined...
Yuri Gurevich
« Prev « First page 1314 / 1413 Last » Next »