Sciweavers

1710 search results - page 304 / 342
» High-Level Programs and Program Conditions
Sort
View
123
Voted
RAS
2010
117views more  RAS 2010»
15 years 17 days ago
Extending BDI plan selection to incorporate learning from experience
An important drawback to the popular Belief, Desire, and Intentions (BDI) paradigm is that such systems include no element of learning from experience. We describe a novel BDI exe...
Dhirendra Singh, Sebastian Sardiña, Lin Pad...
146
Voted
SEKE
2010
Springer
15 years 17 days ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
109
Voted
TLT
2010
90views more  TLT 2010»
15 years 16 days ago
To Flow and Not to Freeze: Applying Flow Experience to Mobile Learning
— A key design goal of mobile learning is that its built-in experiences are enjoyable and proactive, empowering the learner with the knowledge and ability to self-manage. This im...
Jungho Park, David Parsons, Hokyoung Ryu
TSE
2010
161views more  TSE 2010»
15 years 16 days ago
Finding Bugs in Web Applications Using Dynamic Test Generation and Explicit-State Model Checking
— Web script crashes and malformed dynamically-generated web pages are common errors, and they seriously impact the usability of web applications. Current tools for web-page vali...
Shay Artzi, Adam Kiezun, Julian Dolby, Frank Tip, ...
113
Voted
CNSM
2010
15 years 6 days ago
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype
The classification of encrypted traffic on the fly from network traces represents a particularly challenging application domain. Recent advances in machine learning provide the opp...
Riyad Alshammari, A. Nur Zincir-Heywood