Sciweavers

10674 search results - page 1964 / 2135
» The Virtual Environment - Another Approach
Sort
View
COMSIS
2006
141views more  COMSIS 2006»
15 years 4 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
CORR
2006
Springer
101views Education» more  CORR 2006»
15 years 4 months ago
Metric State Space Reinforcement Learning for a Vision-Capable Mobile Robot
We address the problem of autonomously learning controllers for visioncapable mobile robots. We extend McCallum's (1995) Nearest-Sequence Memory algorithm to allow for genera...
Viktor Zhumatiy, Faustino J. Gomez, Marcus Hutter,...
DEBU
2006
163views more  DEBU 2006»
15 years 4 months ago
Towards Activity Databases: Using Sensors and Statistical Models to Summarize People's Lives
Automated reasoning about human behavior is a central goal of artificial intelligence. In order to engage and intervene in a meaningful way, an intelligent system must be able to ...
Tanzeem Choudhury, Matthai Philipose, Danny Wyatt,...
ECEASST
2006
154views more  ECEASST 2006»
15 years 4 months ago
EMF Model Refactoring based on Graph Transformation Concepts
Abstract. The Eclipse Modeling Framework (EMF) provides a modeling and code generation framework for Eclipse applications based on structured data models. Within model driven softw...
Enrico Biermann, Karsten Ehrig, Christian Köh...
ENTCS
2006
80views more  ENTCS 2006»
15 years 4 months ago
Synchronisation in Trust Management Using Push Authorisation
Traditional trust management authorisation decisions for distributed technologies, are, in general, based on the history of the authorisations/computation to date. We consider thi...
Thomas B. Quillinan, Simon N. Foley
« Prev « First page 1964 / 2135 Last » Next »