Sciweavers

1710 search results - page 304 / 342
» High-Level Programs and Program Conditions
Sort
View
RAS
2010
117views more  RAS 2010»
13 years 7 months ago
Extending BDI plan selection to incorporate learning from experience
An important drawback to the popular Belief, Desire, and Intentions (BDI) paradigm is that such systems include no element of learning from experience. We describe a novel BDI exe...
Dhirendra Singh, Sebastian Sardiña, Lin Pad...
SEKE
2010
Springer
13 years 7 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
TLT
2010
90views more  TLT 2010»
13 years 7 months ago
To Flow and Not to Freeze: Applying Flow Experience to Mobile Learning
— A key design goal of mobile learning is that its built-in experiences are enjoyable and proactive, empowering the learner with the knowledge and ability to self-manage. This im...
Jungho Park, David Parsons, Hokyoung Ryu
TSE
2010
161views more  TSE 2010»
13 years 7 months ago
Finding Bugs in Web Applications Using Dynamic Test Generation and Explicit-State Model Checking
— Web script crashes and malformed dynamically-generated web pages are common errors, and they seriously impact the usability of web applications. Current tools for web-page vali...
Shay Artzi, Adam Kiezun, Julian Dolby, Frank Tip, ...
CNSM
2010
13 years 7 months ago
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype
The classification of encrypted traffic on the fly from network traces represents a particularly challenging application domain. Recent advances in machine learning provide the opp...
Riyad Alshammari, A. Nur Zincir-Heywood