Sciweavers

1097 search results - page 187 / 220
» Sequential Object Monitors
Sort
View
PST
2008
15 years 3 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
ADCOG
2004
15 years 3 months ago
Social and Ethical Considerations in Virtual Worlds
While networking technology facilitates the use of online services such as real-time instant messaging and anywhere-anytime multiplayer gaming, societal and ethical issues can inf...
Robert W. Kerbs
CRIWG
2004
15 years 3 months ago
An Integrated Approach for Analysing and Assessing the Performance of Virtual Learning Groups
Collaborative distance learning involves a variety of elements and factors that have to be considered and measured in order to analyse and assess group and individual performance m...
Thanasis Daradoumis, Alejandra Martínez-Mon...
WSC
1997
15 years 3 months ago
Applications of the Universal Joint Task List to Joint Exercise Results
The foundation of readiness is training. The Chairman, Joint Chiefs of Staff (CJCS) Joint Training Program institutes methods for identifying training requirements through review ...
Sam H. Parry, Michael C. McAneny, Richard J. Drome...
AAAI
2008
15 years 3 months ago
Bimodal Spatial Reasoning with Continuous Motion
Symbolic AI systems typically have difficulty reasoning about motion in continuous environments, such as determining whether a cornering car will clear a close obstacle. Bimodal s...
Samuel Wintermute, John E. Laird