Sciweavers

496 search results - page 53 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
AAAI
2000
13 years 9 months ago
Human-Level AI's Killer Application: Interactive Computer Games
Although one of the fundamental goals of AI is to understand and develop intelligent systems that have all of the capabilities of humans, there is little active research directly ...
John E. Laird, Michael van Lent
AOIS
2004
13 years 9 months ago
Agents as Catalysts for Mobile Computing
Agent-Oriented Programming (AOP) offers an alternative and radical approach to the development of information systems in various domains. However, one domain that AOP has only mini...
Gregory M. P. O'Hare, Michael J. O'Grady, Rem W. C...
ISMVL
2010
IEEE
164views Hardware» more  ISMVL 2010»
14 years 1 months ago
On the Number of Products to Represent Interval Functions by SOPs with Four-Valued Variables
Abstract—Let A and B be integers such that A ≤ B. An nvariable interval function is a mapping IN[n : A, B] : {0, 1}n → {0, 1}, where IN[n : A, B](X) = 1 iff A ≤ X ≤ B. Su...
Tsutomu Sasao
AINA
2009
IEEE
14 years 2 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 2 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode