Sciweavers

1998 search results - page 133 / 400
» Situated Control Rules
Sort
View
ISSA
2008
15 years 5 months ago
A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code
Malicious software is prevalent in many forms with the potential for many types of malware to be downloaded while browsing the Internet using an unprotected system. The potential ...
Leonard Shand, Theodore Tryfonas
FLAIRS
2006
15 years 5 months ago
Refining Human Behavior Models in a Context-based Architecture
This paper describes an investigation into the refinement of context-based human behavior models through the use of experiential learning. Specifically, a tactical agent was endow...
David Aihe, Avelino J. Gonzalez
CORR
2012
Springer
210views Education» more  CORR 2012»
14 years 5 days ago
MAV Stabilization using Machine Learning and Onboard Sensors
In many situations, Miniature Aerial Vehicles (MAVs) are limited to using only on-board sensors for navigation. This limits the data available to algorithms used for stabilization...
Jason Yosinski, Cooper Bills
131
Voted
PADL
2001
Springer
15 years 9 months ago
Specifying Authentication Protocols Using Rewriting and Strategies
Abstract. Programming with rewrite rules and strategies has been already used for describing several computational logics. This paper describes the way the Needham-Schroeder Public...
Horatiu Cirstea
GECCO
2008
Springer
178views Optimization» more  GECCO 2008»
15 years 5 months ago
Agent Smith: a real-time game-playing agent for interactive dynamic games
The goal of this project is to develop an agent capable of learning and behaving autonomously and making decisions quickly in a dynamic environment. The agent’s environment is a...
Ryan K. Small