Sciweavers

182 search results - page 17 / 37
» Towards deployment-time dynamic analysis of server applicati...
Sort
View
ECML
2004
Springer
15 years 4 months ago
Analyzing Multi-agent Reinforcement Learning Using Evolutionary Dynamics
In this paper, we show how the dynamics of Q-learning can be visualized and analyzed from a perspective of Evolutionary Dynamics (ED). More specifically, we show how ED can be use...
Pieter Jan't Hoen, Karl Tuyls
ICRA
2010
IEEE
170views Robotics» more  ICRA 2010»
14 years 9 months ago
Towards marine bloom trajectory prediction for AUV mission planning
— This paper presents an oceanographic toolchain that can be used to generate multi-vehicle robotic surveys for large-scale dynamic features in the coastal ocean. Our science app...
Jnaneshwar Das, Kanna Rajany, Sergey Frolovy, Fred...
SAC
2009
ACM
15 years 5 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
SIGIR
2005
ACM
15 years 4 months ago
An application of text categorization methods to gene ontology annotation
This paper describes an application of IR and text categorization methods to a highly practical problem in biomedicine, specifically, Gene Ontology (GO) annotation. GO annotation...
Kazuhiro Seki, Javed Mostafa
DBSEC
2008
137views Database» more  DBSEC 2008»
15 years 10 days ago
Towards Automation of Testing High-Level Security Properties
Abstract. Many security problems only become apparent after software is deployed, and in many cases a failure has occurred prior to the awareness of the problem. Although many woul...
Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad ...