Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Software inspections have proved to be an effective means to find faults in different software artifacts, and the application of software inspections on requirements specification...
—We examine the use of teleological metareasoning for self-adaptation in game-playing software agents. The goal of our work is to develop an interactive environment in which the ...
Joshua Jones, Chris Parnin, Avik Sinharoy, Spencer...
Currently, portable ultrasound units lack 3-dimensional (3D) image display, limiting their usefulness especially under hostile operating environments where information must be int...