Review into state of the art of vulnerability assessment using artificial intelligence

S Khan, S Parkinson - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
Vulnerability assessment is the essential and well-established process of probing security
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …

Multi-heuristic a

S Aine, S Swaminathan, V Narayanan… - … Journal of Robotics …, 2016 - journals.sagepub.com
The performance of heuristic search-based planners depends heavily on the quality of the
heuristic function used to focus the search. These algorithms work fast and generate high …

Racod: algorithm/hardware co-design for mobile robot path planning

M Bakhshalipour, SB Ehsani, M Qadri, D Guri… - Proceedings of the 49th …, 2022 - dl.acm.org
RACOD is an algorithm/hardware co-design for mobile robot path planning. It consists of two
main components: CODAcc, a hardware accelerator for collision detection; and RASExp, an …

[PDF][PDF] Exploring Game Space Using Survival Analysis.

A Isaksen, D Gopstein, A Nealen - FDG, 2015 - game.engineering.nyu.edu
Game designers adjust game parameters to create an optimal experience for players. We
call this high-dimensional set of unique game variants game space. To help designers …

Learning inadmissible heuristics during search

J Thayer, A Dionne, W Ruml - Proceedings of the International …, 2011 - ojs.aaai.org
Suboptimal search algorithms offer shorter solving times by sacrificing guaranteed solution
optimality. While optimal searchalgorithms like A* and IDA* require admissible heuristics …

Efficient distribution of virtual machines for cloud computing

M Schmidt, N Fallenbeck, M Smith… - 2010 18th Euromicro …, 2010 - ieeexplore.ieee.org
The commercial success of Cloud computing and recent developments in Grid computing
have brought platform virtualization technology into the field of high performance computing …

Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach

S Khan, S Parkinson - Expert Systems with Applications, 2018 - Elsevier
Vulnerability assessment and security configuration activities are heavily reliant on expert
knowledge. This requirement often results in many systems being left insecure due to a lack …

Learning to plan for constrained manipulation from demonstrations

M Phillips, V Hwang, S Chitta, M Likhachev - Autonomous Robots, 2016 - Springer
Motion planning in high dimensional state spaces, such as for mobile manipulation, is a
challenging problem. Constrained manipulation, eg, opening articulated objects like doors …

Distributed island-model genetic algorithms using heterogeneous parameter settings

Y Gong, A Fukunaga - 2011 IEEE congress of evolutionary …, 2011 - ieeexplore.ieee.org
Achieving good performance with a parallel genetic algorithm requires properly configuring
control parameters such as mutation rate, crossover rate, and population size. We consider …

Collaborative privacy preserving multi-agent planning: Planners and heuristics

S Maliah, G Shani, R Stern - Autonomous agents and multi-agent systems, 2017 - Springer
In many cases several entities, such as commercial companies, need to work together
towards the achievement of joint goals, while hiding certain private information. To …