Sciweavers

1028 search results - page 187 / 206
» Using Attack Graphs to Design Systems
Sort
View
WWW
2005
ACM
14 years 9 months ago
Popular web hot spots identification and visualization
This work aims a two-fold contribution: it presents a software to analyse logfiles and visualize popular web hot spots and, additionally, presents an algorithm to use this informa...
D. Avramouli, John D. Garofalakis, Dimitris J. Kav...
ICRA
2006
IEEE
198views Robotics» more  ICRA 2006»
14 years 2 months ago
3D Navigation based on a Visual Memory
— This paper addresses the design of a control law for vision-based robot navigation. The method proposed is based on a topological representation of the environment. Within this...
Anthony Remazeilles, François Chaumette, Pa...
PACT
2009
Springer
14 years 1 months ago
Parallel Evidence Propagation on Multicore Processors
In this paper, we design and implement an efficient technique for parallel evidence propagation on state-of-the-art multicore processor systems. Evidence propagation is a major ste...
Yinglong Xia, Xiaojun Feng, Viktor K. Prasanna
AIIDE
2008
13 years 11 months ago
A Cover-Based Approach to Multi-Agent Moving Target Pursuit
We explore the task of designing an efficient multi-agent system that is capable of capturing a single moving target, assuming that every agent knows the location of all agents on...
Alejandro Isaza, Jieshan Lu, Vadim Bulitko, Russel...
CIKM
2010
Springer
13 years 7 months ago
Rank learning for factoid question answering with linguistic and semantic constraints
This work presents a general rank-learning framework for passage ranking within Question Answering (QA) systems using linguistic and semantic features. The framework enables query...
Matthew W. Bilotti, Jonathan L. Elsas, Jaime G. Ca...