Sciweavers

237 search results - page 27 / 48
» On information hiding with incomplete information about steg...
Sort
View
FLAIRS
2006
14 years 11 months ago
One-Shot Procedure Learning from Instruction and Observation
Learning tasks from a single demonstration presents a significant challenge because the observed sequence is inherently an incomplete representation of the procedure that is speci...
Hyuckchul Jung, James F. Allen, Nathanael Chambers...
CSUR
1999
114views more  CSUR 1999»
14 years 9 months ago
Directions for Research in Approximate System Analysis
useful for optimizing compilers [15], partial evaluators [11], abstract debuggers [1], models-checkers [2], formal verifiers [13], etc. The difficulty of the task comes from the fa...
Patrick Cousot
APN
2010
Springer
14 years 7 months ago
Learning Workflow Petri Nets
Workflow mining is the task of automatically producing a workflow model from a set of event logs recording sequences of workflow events; each sequence corresponds to a use case or ...
Javier Esparza, Martin Leucker, Maximilian Schlund
MAGS
2010
92views more  MAGS 2010»
14 years 4 months ago
Sequential auctions for common value objects with budget constrained bidders
This paper analyzes sequential auctions for budget constrained bidders, for multiple heterogeneous common value objects. In most auctions, bidders not only have valuations for obj...
S. Shaheen Fatima, Michael Wooldridge, Nicholas R....
ISSTA
2012
ACM
13 years 6 days ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...