Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 20 of 142)
'Practice' for Enhancing the Performance of a Deep Reinforcement Learning Agent
A Beginning-to-End System for Efficiently Gathering Tracking Data on Multiple Targets
A Critical, Empirical, and Reflexive Investigation of the Promise of Democratization in the Making Phenomenon
A LANGUAGE-BASED APPROACH FOR SECURING ACTIONSCRIPT/FLASH VULNERABILITIES
A Survey of Network Modeling
A framework for the use of wearables to enable study of stress
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
A presentation and evaluation of guided-learning activities and program visualization tool, dissav, to teach stack smashing
AI Based Realistic Multi-Hop Wireless Simulation
ANALYSIS OF OPTICAL FIBER SPECKLE PATTERNS FOR DETECTION OF IVUS CATHETER TIP IN 3D SPACE: AN INTELLIGENT SENSOR RESEARCH
ARTIFICIAL FINANCIAL MARKET: AN AGENT-BASED APPROACH TO MODELING THE INFLUENCE OF TRADERS CHARACTERISTICS ON EMERGENT MARKET PHENOMENA
AUTOMATIC UNIT TESTING TO DETECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
Active Cyber Defense Planning and Orchestration
An Approach Towards an Autonomic Computing Prototype Reference Architecture
An Evidence-Based Digital Nudging In Support Of Health Misinformation Assessment  On Social Media Sites
Anomaly Detection for Manufacturing Applications Using Convolutional Autoencoders
Anomaly Detection for Manufacturing Applications Using Convolutional Autoencoders
Autonomous Cyber Defense: Formal Models and Applications
Aviatar- An Augmented Reality System to Improve Pilot Performance for Unmanned Aerial Systems
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS