Sciweavers

856 search results - page 68 / 172
» Design Guidance through the Controlled Application of Constr...
Sort
View
CCS
2010
ACM
13 years 8 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
IJCAI
2001
13 years 10 months ago
Robot Weightlifting By Direct Policy Search
This paper describes a method for structuring a robot motor learning task. By designing a suitably parameterized policy, we show that a simple search algorithm, along with biologi...
Michael T. Rosenstein, Andrew G. Barto
DCC
2008
IEEE
14 years 8 months ago
Dimension Reduction and Expansion: Distributed Source Coding in a Noisy Environment
We studied the problem of distributed coding and transmission of intercorrelated sources with memory. Different from the conventional distributed source coding structure which rel...
Anna N. Kim, Fredrik Hekland
FASE
2003
Springer
14 years 2 months ago
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment
Abstract. A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobil...
David Scott, Alastair R. Beresford, Alan Mycroft
MSS
2003
IEEE
90views Hardware» more  MSS 2003»
14 years 2 months ago
NSM: A Distributed Storage Architecture for Data-Intensive Applications
: Several solutions have been developed to provide dataintensive applications with the highest possible data rates. Such solutions tried to utilize the available network resources ...
Zeyad Ali, Qutaibah M. Malluhi