Sciweavers

8141 search results - page 1377 / 1629
» Higher Order Generalization
Sort
View
NDSS
2009
IEEE
15 years 11 months ago
Scalable, Behavior-Based Malware Clustering
Anti-malware companies receive thousands of malware samples every day. To process this large quantity, a number of automated analysis tools were developed. These tools execute a m...
Ulrich Bayer, Paolo Milani Comparetti, Clemens Hla...
ATAL
2009
Springer
15 years 11 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
GECCO
2009
Springer
151views Optimization» more  GECCO 2009»
15 years 11 months ago
Evolution of functional specialization in a morphologically homogeneous robot
A central tenet of embodied artificial intelligence is that intelligent behavior arises out of the coupled dynamics between an agent’s body, brain and environment. It follows t...
Joshua S. Auerbach, Josh C. Bongard
HT
2009
ACM
15 years 11 months ago
Designing hypertext tools to facilitate authoring multiple points-of-view stories
How can authoring tools help authors create complex, innovative hypertext narrative structures? Tools for creating hypertext fiction typically represent such narratives in the fo...
Alex Mitchell, Kevin McGee
IWCMC
2009
ACM
15 years 11 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
« Prev « First page 1377 / 1629 Last » Next »