Sciweavers

2006 search results - page 88 / 402
» Heuristic Security-Testing Methods
Sort
View
110
Voted
INFORMATICALT
2006
89views more  INFORMATICALT 2006»
15 years 18 days ago
Investigation of Examples of E-Education Environment for Scientific Collaboration and Distance Graduate Studies, Part 1
The objective is to investigate two emerging information technologies in graduate studies and scientific cooperation. Internet is the first technology. The open source is the secon...
Jonas Mockus
120
Voted
ATAL
2007
Springer
15 years 6 months ago
Automatic feature extraction for autonomous general game playing agents
The General Game Playing (GGP) problem is concerned with developing systems capable of playing many different games, even games the system has never encountered before. Successful...
David M. Kaiser
87
Voted
PDPTA
2003
15 years 2 months ago
Queryball: A New Model for Querying in Immersive VR Systems
— In this paper, we propose a powerful and convenient querying model, "Queryball", for users to query in immersive VR systems. In immersive VR systems, users expect int...
Chiemi Watanabe, Ayumi Osugi, Yoshifumi Masunaga, ...
101
Voted
PRL
2008
88views more  PRL 2008»
15 years 17 days ago
Time-efficient spam e-mail filtering using n-gram models
In this paper, we propose spam e-mail filtering methods having high accuracies and low time complexities. The methods are based on the n-gram approach and a heuristics which is re...
Ali Çiltik, Tunga Güngör
TSE
2010
123views more  TSE 2010»
14 years 7 months ago
Directed Explicit State-Space Search in the Generation of Counterexamples for Stochastic Model Checking
Current stochastic model checkers do not make counterexamples for property violations readily available. In this paper we apply directed explicit state space search to discrete- a...
Husain Aljazzar, Stefan Leue