Sciweavers

4463 search results - page 785 / 893
» computing 2000
Sort
View
100
Voted
SEC
2004
15 years 2 months ago
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
Abstract--Stack smashing is still one of the most popular techniques for computer system attack. In this work, we present an antistack-smashing defense technique for Microsoft Wind...
Danny Nebenzahl, Avishai Wool
AAAI
2000
15 years 2 months ago
Self-Organization of Innate Face Preferences: Could Genetics Be Expressed through Learning?
Self-organizing models develop realistic cortical structures when given approximations of the visual environment as input, and are an effective way to model the development of fac...
James A. Bednar, Risto Miikkulainen
113
Voted
AAAI
2000
15 years 2 months ago
Making Rational Decisions Using Adaptive Utility Elicitation
Rational decision making requires full knowledge of the utility function of the person affected by the decisions. However, in many cases, the task of acquiring such knowledge is n...
Urszula Chajewska, Daphne Koller, Ronald Parr
AAAI
2000
15 years 2 months ago
A Game-Theoretic Approach to Constraint Satisfaction
We shed light on the connections between different approaches to constraint satisfaction by showing that the main consistency concepts used to derive tractability results for cons...
Phokion G. Kolaitis, Moshe Y. Vardi
92
Voted
AAAI
2000
15 years 2 months ago
Predicting UNIX Command Lines: Adjusting to User Patterns
As every user has his own idiosyncrasies and preferences, an interface that is honed for one user may be problematic for another. To accommodate a diverse range of users, many com...
Benjamin Korvemaker, Russell Greiner