Now showing items 1-10 of 17
Vulnerability discovery in multiple version software systems: open source and commercial software systems
Author(s):Kim, Jin Yoo
The vulnerability discovery process for a program describes the rate at which the vulnerabilities are discovered. A model of the discovery process can be used to estimate the number of vulnerabilities likely to be discovered ...
Automatic endpoint vulnerability detection of Linux and open source using the National Vulnerability Database
Author(s):Whyman, Paul Arthur
A means to reduce security risks to a network of computers is to manage which computers can participate on a network, and control the participation of systems that do not conform to the security policy. Requiring systems ...
Automatic prediction of interest point stability
Author(s):Comer, Thomson H.
Many computer vision applications depend on interest point detectors as a primary means of dimensionality reduction. While many experiments have been done measuring the repeatability of selective attention algorithms ...
Synthesis of reinforcement learning and robust control theory, A
Author(s):Kretchmar, R. Matthew
The pursuit of control algorithms with improved performance drives the entire control research community as well as large parts of the mathematics, engineering, and artificial intelligence research communities. A fundamental ...
Machine learned boundary definitions for an expert's tracing assistant in image processing
Most image processing work addressing boundary definition tasks embeds the assumption that an edge in an image corresponds to the boundary of interest in the world. In straightforward imagery this is true, however it is ...
Applying static code analysis to firewall policies for the purpose of anomaly detection
Treating modern firewall policy languages as imperative, special purpose programming languages, in this thesis we will try to apply static code analysis techniques for the purpose of anomaly detection. We will first abstract ...
Empirical modeling and analysis of local search algorithms for the job-shop scheduling problem
Local search algorithms are among the most effective approaches for locating high-quality solutions to a wide range of combinatorial optimization problems. However, our theoretical understanding of these algorithms is very ...
Algorithmic implementation of expert object recognition in ventral visual pathway, An
Understanding the mechanisms underlying visual object recognition has been an important subject in both human and machine vision since the early days of cognitive science. Current state-of-the-art machine vision systems ...
Integrated method for improving testing effectiveness and efficiency, An
Author(s):Stringfellow, Catherine V.
The aim of testing is to find errors and to find them as early as possible. Specifically, system testing should uncover more errors before release to reduce the number of errors found in post-release. System testing should ...
Echo state model of non-Markovian reinforcement learning, An
Author(s):Bush, Keith A.
There exists a growing need for intelligent, autonomous control strategies that operate in real-world domains. Theoretically the state-action space must exhibit the Markov property in order for reinforcement learning to ...