Sciweavers

731 search results - page 128 / 147
» Applying a Model Driven Approach to an E-Business Environmen...
Sort
View
SAC
2010
ACM
14 years 2 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
SAC
2010
ACM
14 years 2 months ago
Towards mobile process as a service
Process as a Service (PaaS) addresses modeling, execution and management of business processes without running extensive and costly process management software. Such a flexible o...
Sonja Zaplata, Winfried Lamersdorf
IROS
2007
IEEE
168views Robotics» more  IROS 2007»
14 years 1 months ago
Improving humanoid locomotive performance with learnt approximated dynamics via Gaussian processes for regression
Abstract— We propose to improve the locomotive performance of humanoid robots by using approximated biped stepping and walking dynamics with reinforcement learning (RL). Although...
Jun Morimoto, Christopher G. Atkeson, Gen Endo, Go...
GECCO
2006
Springer
180views Optimization» more  GECCO 2006»
13 years 11 months ago
Improving cooperative GP ensemble with clustering and pruning for pattern classification
A boosting algorithm based on cellular genetic programming to build an ensemble of predictors is proposed. The method evolves a population of trees for a fixed number of rounds an...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
SAC
2006
ACM
14 years 1 months ago
Making tuple spaces physical with RFID tags
In this paper, we describe the design and implementation of a tuple-based distributed memory realized with the use of RFID technology. The key idea – rooted in a more general sc...
Marco Mamei, Renzo Quaglieri, Franco Zambonelli