Sciweavers

1916 search results - page 372 / 384
» Reconfiguring a state machine
Sort
View
ATAL
2007
Springer
13 years 11 months ago
Confidence-based policy learning from demonstration using Gaussian mixture models
We contribute an approach for interactive policy learning through expert demonstration that allows an agent to actively request and effectively represent demonstration examples. I...
Sonia Chernova, Manuela M. Veloso
ECOWS
2009
Springer
13 years 11 months ago
An Analysis of Windows Workflow's Control-Flow Expressiveness
The Windows Workflow Foundation (WF) has been introduced as part of the .NET framework as a means of creating workflow-centric applications. Its intended field of application is br...
Marco Zapletal, Wil M. P. van der Aalst, Nick Russ...
ACSC
2004
IEEE
13 years 11 months ago
A RMI Protocol for Aglets
Aglets is a mobile agent system that allows an agent to move with its code and execution state across the network to interact with other entities. Aglets utilizes Java RMI to supp...
Feng Lu, Kris Bubendorfer
ANCS
2006
ACM
13 years 11 months ago
Efficient memory utilization on network processors for deep packet inspection
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is essential for network security, intrusion detection and c...
Piti Piyachon, Yan Luo
CCS
2006
ACM
13 years 11 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen