Sciweavers

1557 search results - page 5 / 312
» What can we do with a Solution
Sort
View
PST
2008
13 years 9 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
KR
1998
Springer
13 years 11 months ago
What Robots Can Do
In this paper, we propose a definition of goal achievability: given a basic action theory describing an initial state of the world and some primitive actions available to a robot,...
Hector J. Levesque
HICSS
2009
IEEE
167views Biometrics» more  HICSS 2009»
14 years 2 months ago
E-Commerce and E-Government: How Do They Compare? What Can They Learn from Each Other?
For more than a decade e-Commerce and eGovernment applications have made major impacts in their respective sectors, private and public. Some time ago, we presented early insights ...
Hans Jochen Scholl, Karine Barzilai-Nahon, Jin-Hyu...
ACL
1993
13 years 8 months ago
How do we count? The Problem of Tagging Phrasal Verbs in Parts
This paper examines the current performance of the stochastic tagger PARTS (Church 88) in handling phrasal verbs, describes a problem that arises from the statistical model used, ...
Nava A. Shaked
AI
1998
Springer
13 years 7 months ago
What Robots Can Do: Robot Programs and Effective Achievability
In this paper, we propose a definition of goal achievability: given a basic action theory describing an initial state of the world and some primitive actions available to a robot...
Fangzhen Lin, Hector J. Levesque