The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
We report results of an interdisciplinary project which aims at endowing a real robot system with the capacity for learning by goaldirected imitation. The control architecture is b...
Wolfram Erlhagen, Albert Mukovskiy, Estela Bicho, ...
This paper presents a new connectionist model of the grounding of linguistic quantifiers in perception that takes into consideration the contextual factors affecting the use of vag...
Rohana K. Rajapakse, Angelo Cangelosi, Kenny R. Co...
We explore the use of eye movements as a source of implicit relevance feedback information. We construct a controlled information retrieval experiment where the relevance of each t...