Sciweavers

DSN
2011
IEEE
13 years 2 months ago
Analysis of security data from a large computing organization
In this work, we study security incidents that occurred over period of 5 years at the National Center for Supercomputing Applications at the University of Illinois. The analysis co...
Aashish Sharma, Zbigniew Kalbarczyk, James Barlow,...
KESAMSTA
2011
Springer
13 years 5 months ago
Extending the JADE Agent Behaviour Model with JBehaviourTrees Framework
Creating modular behaviours in JADE using a traditional method such as the FSM (Finite State Machine) can be a difficult task to achieve. The first issue with FSMs is that they do...
Iva Bojic, Tomislav Lipic, Mario Kusek, Gordan Jez...
AGI
2011
13 years 6 months ago
Measuring Agent Intelligence via Hierarchies of Environments
Under Legg’s and Hutter’s formal measure [1], performance in easy environments counts more toward an agent’s intelligence than does performance in difficult environments. An ...
Bill Hibbard
SIGCSE
2008
ACM
153views Education» more  SIGCSE 2008»
14 years 25 days ago
A cross-domain visual learning engine for interactive generation of instructional materials
We present the design and development of a Visual Learning Engine, a tool that can form the basis for interactive development of visually rich teaching and learning modules across...
K. R. Subramanian, T. Cassen
BMCBI
2007
159views more  BMCBI 2007»
14 years 2 months ago
Computational genes: a tool for molecular diagnosis and therapy of aberrant mutational phenotype
Background: A finite state machine manipulating information-carrying DNA strands can be used to perform autonomous molecular-scale computations at the cellular level. Results: We ...
Israel Mark Martínez-Pérez, Gong Zha...
ASE
2010
126views more  ASE 2010»
14 years 2 months ago
Generating a checking sequence with a minimum number of reset transitions
Given a finite state machine M, a checking sequence is an input sequence that is guaranteed to lead to a failure if the implementation under test is faulty and has no more states t...
Robert M. Hierons, Hasan Ural
ICVGIP
2004
14 years 3 months ago
A Framework for Activity Recognition and Detection of Unusual Activities
In this paper we present a simple framework for activity recognition based on a model of multi-layered finite state machines, built on top of a low level image processing module f...
Dhruv Mahajan, Nipun Kwatra, Sumit Jain, Prem Kalr...
ACSW
2004
14 years 3 months ago
A Framework for Obfuscated Interpretation
Software protection via obscurity is now considered fundamental for securing software systems. This paper proposes a framework for obfuscating the program interpretation instead o...
Akito Monden, Antoine Monsifrot, Clark D. Thombors...
IJCAI
2007
14 years 3 months ago
Fault-Model-Based Test Generation for Embedded Software
Testing embedded software systems on the control units of vehicles is a safety-relevant task, and developing the test suites for performing the tests on test benches is time-consu...
Michael Esser, Peter Struss
ASSETS
2008
ACM
14 years 4 months ago
Brain-controlled finite state machine for wheelchair navigation
This proposal is about a brain-controlled electrically powered wheelchair. The system comprises a brain-computer interface based on steady-state visual evoked potentials and a pro...
Amir Teymourian, Thorsten Lüth, Axel Graeser,...