Sciweavers

1278 search results - page 247 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
FLAIRS
2004
13 years 9 months ago
Agent-based Players for a First-person Entertainment-based Real-time Artificial Environment
The necessity for improved players and opponents in firstperson entertainment-based real-time artificial environments has inspired our research into artificial game players. We em...
G. Michael Youngblood, Lawrence B. Holder
LREC
2010
173views Education» more  LREC 2010»
13 years 9 months ago
Transcriber Driving Strategies for Transcription Aid System
Speech recognition technology suffers from a lack of robustness which limits its usability for fully automated speech-to-text transcription, and manual correction is generally req...
Grégory Senay, Georges Linares, Benjamin Le...
CSE
2009
IEEE
13 years 11 months ago
Equilibria and Efficiency Loss in Games on Networks
Social networks are the substrate upon which we make and evaluate many of our daily decisions: our costs and benefits depend on whether--or how many of, or which of--our friends ar...
Joshua R. Davis, Zachary Goldman, Jacob Hilty, Eli...
TDP
2010
189views more  TDP 2010»
13 years 2 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...
SIGMOD
2011
ACM
270views Database» more  SIGMOD 2011»
12 years 10 months ago
Automatic discovery of attributes in relational databases
In this work we design algorithms for clustering relational columns into attributes, i.e., for identifying strong relationships between columns based on the common properties and ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...