Sciweavers

419 search results - page 58 / 84
» Interacting State Machines for Mobility
Sort
View
RAID
2010
Springer
13 years 5 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
ICML
2005
IEEE
14 years 8 months ago
2D Conditional Random Fields for Web information extraction
The Web contains an abundance of useful semistructured information about real world objects, and our empirical study shows that strong sequence characteristics exist for Web infor...
Jun Zhu, Zaiqing Nie, Ji-Rong Wen, Bo Zhang, Wei-Y...
FPLAY
2008
13 years 9 months ago
Integrating cumulative context into computer games
In this paper, we describe a cumulative context computer game, where accumulated contextual information of the players activity levels, obtained through mobile sensors, is used to...
Kevin G. Stanley, David Pinelle, Alan Bandurka, Da...
CONNECTION
2004
117views more  CONNECTION 2004»
13 years 7 months ago
Structure and function of evolved neuro-controllers for autonomous robots
The Artificial Life approach to Evolutionary Robotics is used as a fundamental framework for the development of a modular neural control of autonomous mobile robots. The applied e...
Martin Hülse, Steffen Wischmann, Frank Pasema...
CASSIS
2004
Springer
14 years 29 days ago
History-Based Access Control and Secure Information Flow
Abstract. This paper addresses the problem of static checking of programs to ensure that they satisfy confidentiality policies in the presence of dynamic access control in the for...
Anindya Banerjee, David A. Naumann