Sciweavers

5544 search results - page 878 / 1109
» Three Inadequate Models
Sort
View
115
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Worm Detection, Early Warning and Response Based on Local Victim Information
Worm detection systems have traditionally focused on global strategies. In the absence of a global worm detection system, we examine the effectiveness of local worm detection and ...
Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David D...
143
Voted
CCGRID
2004
IEEE
15 years 7 months ago
Routing and resource discovery in Phoenix Grid-enabled message passing library
We describe design and implementation of a "Gridenabled" message passing library, in the context of Phoenix message passing model. It supports (1) message routing betwee...
Kenji Kaneda, Kenjiro Taura, Akinori Yonezawa
ARGMAS
2006
Springer
15 years 7 months ago
An Argumentation-Based Approach for Practical Reasoning
We build on recent work on argumentation frameworks for generating desires and plans. We provide a rich instantiDung's abstract argumentation framework for (i) generating con...
Iyad Rahwan, Leila Amgoud
124
Voted
ASPDAC
2006
ACM
141views Hardware» more  ASPDAC 2006»
15 years 7 months ago
Depth-driven verification of simultaneous interfaces
The verification of modern computing systems has grown to dominate the cost of system design, often with limited success as designs continue to be released with latent bugs. This t...
Ilya Wagner, Valeria Bertacco, Todd M. Austin
235
Voted
ATAL
2006
Springer
15 years 7 months ago
A hierarchical approach to efficient reinforcement learning in deterministic domains
Factored representations, model-based learning, and hierarchies are well-studied techniques for improving the learning efficiency of reinforcement-learning algorithms in large-sca...
Carlos Diuk, Alexander L. Strehl, Michael L. Littm...