Sciweavers

1663 search results - page 34 / 333
» Computer Security in the Real World
Sort
View
FLAIRS
2004
13 years 9 months ago
Developing Task Specific Sensing Strategies Using Reinforcement Learning
Robots that can adapt and perform multiple tasks promise to be a powerful tool with many applications. In order to achieve such robots, control systems have to be constructed that...
Srividhya Rajendran, Manfred Huber
ITICSE
2009
ACM
14 years 2 months ago
Xen worlds: leveraging virtualization in distance education
The Xen Worlds project at Iowa State University was designed to provide a virtualized lab environment for the Information Assurance program. The large number of off-campus student...
Benjamin R. Anderson, Amy K. Joines, Thomas E. Dan...
HUC
2003
Springer
14 years 23 days ago
Building World Models by Ray-Tracing within Ceiling-Mounted Positioning Systems
Context-aware computing in location-aware environments demands the combination of real world position with a computational world model to infer context. We present a novel approach...
Robert K. Harle, Andy Hopper
CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 6 months ago
Simulation of Computer Network Attacks
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities)...
Carlos Sarraute, Fernando Miranda, José Ign...
IJIS
2007
88views more  IJIS 2007»
13 years 7 months ago
Recent advances in computational models of natural argument
This paper reviews recent advances in the interdisciplinary area lying between artificial intelligence and the theory of argumentation. The paper has two distinct foci: first, exam...
Chris Reed, Floriana Grasso