Sciweavers

4763 search results - page 87 / 953
» On the Execution of Deep Models
Sort
View
IJCAI
2003
15 years 1 months ago
Neural Executive Attentional Control in Robots
We have developed a robot controller based upon a neural implementation of Norman and Shallice's model of executive attentional control in humans. A simulation illustrates ho...
Jason Garforth, Sue L. McHale, Anthony Meehan
ENTCS
2007
97views more  ENTCS 2007»
14 years 11 months ago
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions
In this paper we develop a framework, based on strand spaces, for reasoning about cryptographic protocols and characterizing their executions. We define skeletons, homomorphisms,...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...
RAID
2007
Springer
15 years 5 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
ACSAC
2006
IEEE
15 years 5 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...
ADC
2006
Springer
135views Database» more  ADC 2006»
15 years 5 months ago
Using a temporal constraint network for business process execution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, the technology continues to face challenges i...
Ruopeng Lu, Shazia Wasim Sadiq, Vineet Padmanabhan...