Sciweavers

957 search results - page 44 / 192
» Addition Chain Heuristics
Sort
View
USS
2008
14 years 11 days ago
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Web sites on the Internet often use redirection. Unfortunately, without additional security, many of the redirection links can be manipulated and abused to mask phishing attacks. ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
OPODIS
2008
13 years 11 months ago
Revising Distributed UNITY Programs Is NP-Complete
We focus on automated revision techniques for adding Unity properties to distributed programs. We show that unlike centralized programs, where multiple safety properties along with...
Borzoo Bonakdarpour, Sandeep S. Kulkarni
IROS
2007
IEEE
129views Robotics» more  IROS 2007»
14 years 4 months ago
Representability of human motions by factorial hidden Markov models
— This paper describes an improved methodology for human motion recognition and imitation based on Factorial Hidden Markov Models (FHMM). Unlike conventional Hidden Markov Models...
Dana Kulic, Wataru Takano, Yoshihiko Nakamura
ATAL
2005
Springer
14 years 3 months ago
AgentSteel: an agent-based online system for the planning and observation of steel production
The steel production of the German company Saarstahl AG, a global respected steel manufacturer, represents a Supply Chain which comprehends several time-critical and highly interf...
Sven Jacobi, Cristián Madrigal-Mora, Esteba...
NIPS
2004
13 years 11 months ago
Large-Scale Prediction of Disulphide Bond Connectivity
The formation of disulphide bridges among cysteines is an important feature of protein structures. Here we develop new methods for the prediction of disulphide bond connectivity. ...
Pierre Baldi, Jianlin Cheng, Alessandro Vullo