Sciweavers

699 search results - page 60 / 140
» mc 2008
Sort
View
91
Voted
NSDI
2008
15 years 2 months ago
Behind Phishing: An Examination of Phisher Modi Operandi
Phishing costs Internet users billions of dollars a year. Using various data sets collected in real-time, this paper analyzes various aspects of phisher modi operandi. We examine ...
D. Kevin McGrath, Minaxi Gupta
105
Voted
CHI
2008
ACM
16 years 28 days ago
Real ethics in a virtual world
This paper investigates the ethics of the appearance and behavior of avatars in massively multi-user online communities, in particular, avatars created for virtual business intera...
Victoria McArthur
AIIDE
2008
15 years 2 months ago
Learning to be a Bot: Reinforcement Learning in Shooter Games
This paper demonstrates the applicability of reinforcement learning for first person shooter bot artificial intelligence. Reinforcement learning is a machine learning technique wh...
Michelle McPartland, Marcus Gallagher
104
Voted
ETFA
2008
IEEE
15 years 2 months ago
Descending Deviation Optimization techniques for scheduling problems
In factory automation, production line scheduling entails a number of competing issues. Finding optimal configurations often requires use of local search techniques. Local search l...
Kevin McCarty, Milos Manic
97
Voted
DEXAW
2008
IEEE
120views Database» more  DEXAW 2008»
15 years 7 months ago
Robust Data Exchange for Unreliable P2P Networks
The aim of this work is to provide a robust way for peers with heterogeneous data sources to exchange information in an unreliable network. We address this problem in two ways. Fi...
Duc Minh Le, Andrew Smith, Peter McBrien