Filters








37,245 Hits in 8.8 sec

Penetrating the black box of time-on-task estimation

Vitomir Kovanović, Dragan Gašević, Shane Dawson, Srećko Joksimović, Ryan S. Baker, Marek Hatala
2015 Proceedings of the Fifth International Conference on Learning Analytics And Knowledge - LAK '15  
This paper presents the results of a study that examined the effects of different time-on-task estimation methods on the results of commonly adopted analytical models.  ...  Furthermore, the paper provides an overview of time-on-task estimation methods in educational and related research fields.  ...  [33] does not provide any information on the process of time-on-task estimation.  ... 
doi:10.1145/2723576.2723623 dblp:conf/lak/KovanovicGDJBH15 fatcat:cchagpxxcjc6lljziryii66aum

Load Inertia Estimation Using White and Grey-Box Estimators for Power Systems with High Wind Penetration

M. Reza Bank Tavakoli, Michael Power, Lisa Ruttledge, Damian Flynn
2012 IFAC Proceedings Volumes  
The impact of sampling rates, time shifting and signal averaging on parameter estimation is also considered.  ...  A grey-box identification method is also applied to estimate the inertia of synchronous generators.  ...  In Section 5 grey-box estimation of generating unit inertia based on time domain sampled data is presented.  ... 
doi:10.3182/20120902-4-fr-2032.00071 fatcat:uuic7zg3anafddkbkxh3iebxye

Seven Phrase Penetration Testing Model

Parvin Ami, Ashikali Hasan
2012 International Journal of Computer Applications  
The dynamic model of penetration testing can be implementing freely and efficiently on almost all type of applications.  ...  This approach is to be included in a dynamic model which have the aim to bind the complex and lengthy procedure of penetration testing process.  ...  According to predefined and general approach of testing application, is divided into two wide categories such as blackbox testing and white-box testing: Black Box Testing This approach is based on web  ... 
doi:10.5120/9543-3991 fatcat:f6vmwnhjwvfopcv2ib3gn4kz3i

Data Driven Approaches for Prediction of Building Energy Consumption at Urban Level

Giovanni Tardioli, Ruth Kerrigan, Mike Oates, James O'Donnell, Donal Finn
2015 Energy Procedia  
The majority of research to date that exploits data-driven approaches, has mainly focused on analysis at an individual building level.  ...  The current paper provides a literature review of the recent applications of data-driven models at an urban scale, underlining the opportunities for further research in this context.  ...  Acknowledgement The authors gratefully acknowledge the European Commission for providing financial support during conduct of research under FP7-PEOPLE-2013 Marie Curie Initial Training Network "CI-NERGY  ... 
doi:10.1016/j.egypro.2015.11.754 fatcat:euzh5cgtjjaqzbmmc5m5z4qhxy

Automated PCB Reverse Engineering

Stephan Kleber, Henrik Ferdinand Nölscher, Frank Kargl
2017 Workshop on Offensive Technologies  
Motivated by the lack of inexpensive methods for efficiently performing PCB reverse engineering, we propose a novel framework that formalizes and automates most of the tasks required for PCB reverse engineering  ...  The very first step for analyzing the security of an embedded device, without prior knowledge of the device's construction, is analyzing the printed circuit board (PCB) of the device, in order to understand  ...  Acknowledgements We greatly appreciate the advice and resources for this project provided by Code White GmbH, Ulm.  ... 
dblp:conf/woot/KleberNK17 fatcat:7ggpi6bsxrbg7pxi46i5ww2fwa

Visuomotor adaptation and proprioceptive recalibration in older adults

Erin K. Cressman, Danielle Salomonczyk, Denise Y. P. Henriques
2010 Experimental Brain Research  
From the results of the present study, it is clear that changes in both sensory and motor systems are possible in older adults and could contribute to the preserved visuomotor adaptation.  ...  This work was supported by Canadian Institute of Health Research-Institute of Neurosciences, Mental Health and Addiction and the Banting Foundation (DYPH).  ...  and complete the tasks outlined below in a timely manner.  ... 
doi:10.1007/s00221-010-2392-2 pmid:20717800 fatcat:3gy7zacdfjfuvbldp7ixnqyxii

Generating penetration path hypotheses for decision support in multiple trauma

O Ogunyemi, J Kaye, B Webber, J R Clarke
1995 Proceedings. Symposium on Computer Applications in Medical Care  
The system also identifies the anatomical structures associated with each hypothesis. The various penetration path hypotheses follow from a combinatorial analysis of the set of surface wounds.  ...  The affected structures are determined by performing a detailed interpenetration analysis between 3D models of a penetration path and each anatomical structure within the body.  ...  Since bounding boxes give at best a rough estimate of the actual shape and size of a figure, the first step may yield false positives (i.e., detect bounding box intersections in cases where the actual  ... 
pmid:8563315 pmcid:PMC2579052 fatcat:xgw3mpk25fgzxi4x5owts4rgce

Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting

Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cliff Zou
2007 Proceedings of the Computer Security Applications Conference  
Our evaluation on a Windows server program shows that this approach is superior to random black box fuzzing for increasing code coverage and depth of penetration into program control flow logic.  ...  We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic.  ...  Typical running times were on the order of 20-30 minutes.  ... 
doi:10.1109/acsac.2007.4413013 fatcat:c5wcekqhd5czdfjleoadep2nny

STANCE: Locomotion Adaptation over Soft Terrain [article]

Shamel Fahmi, Michele Focchi, Andreea Radulescu, Geoff Fink, Victor Barasuol, Claudio Semini
2019 arXiv   pre-print
We validated STANCE both in simulation and experiment on the Hydraulically actuated Quadruped (HyQ) robot, and we compared it against the state of the art WBC.  ...  STANCE consists of a WBC that exploits the knowledge of the terrain to generate an optimal solution that is contact consistent and an online terrain compliance estimator that provides the WBC with terrain  ...  ACKNOWLEDGEMENTS We thank Gustavo Medrano-Cerda, Roy Featherstone, and all the DLS lab members for the help provided during this work.  ... 
arXiv:1904.12306v2 fatcat:vntzxxhpgvdrdgogundu5dphxi

Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting

Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cliff Zou
2007 Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007)  
Our evaluation on a Windows server program shows that this approach is superior to random black box fuzzing for increasing code coverage and depth of penetration into program control flow logic.  ...  We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic.  ...  Typical running times were on the order of 20-30 minutes.  ... 
doi:10.1109/acsac.2007.27 dblp:conf/acsac/SparksECZ07 fatcat:g6evh3asanduvb3gsy4phzfgjq

FCL: A general purpose library for collision and proximity queries

Jia Pan, Sachin Chitta, Dinesh Manocha
2012 2012 IEEE International Conference on Robotics and Automation  
The set of queries includes discrete collision detection, continuous collision detection, separation distance computation and penetration depth estimation.  ...  The runtime performance of the library is comparable to state of the art collision and proximity algorithms.  ...  The penetration depth estimation only computes local penetration depth as opposed to global penetration depth, the performance of queries on point-cloud data can be relatively slow and needs to be tested  ... 
doi:10.1109/icra.2012.6225337 dblp:conf/icra/PanCM12 fatcat:vad7azvlmfgbbjis77uquow7li

Static analysis versus penetration testing: A controlled experiment

Riccardo Scandariato, James Walden, Wouter Joosen
2013 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE)  
After researching how to assess your applications, you find that the most popular techniques (also offered by most security consultancies) are automated static analysis and black box penetration testing  ...  Suppose you have to assemble a security team, which is tasked with performing the security analysis of your organization's latest applications.  ...  With the financial support from the Prevention of and Fight against Crime Programme of the European Union (B-CCENTRE).  ... 
doi:10.1109/issre.2013.6698898 dblp:conf/issre/ScandariatoWJ13 fatcat:zpctzeumsrbg5jvwyxe4wabhie

Medial Frontal Cortex Motivates But Does Not Control Movement Initiation in the Countermanding Task

K. W. Scangos, V. Stuphorn
2010 Journal of Neuroscience  
However, the activity of 76% (202 of 267) of movement-related neurons was contingent on the expectation of reward and 42% of them reflected the amount of expected reward.  ...  Surprisingly, 99% (242 of 243) of movement-related neurons in SMA and pre-SMA failed to exhibit time-locked activity changes predictive of movement initiation in this task.  ...  Penetrations that yielded no movement-related neurons are indicated by black dots. The horizontal black line indicates the location of the branch of the arcuate sulcus.  ... 
doi:10.1523/jneurosci.4509-09.2010 pmid:20130204 pmcid:PMC4041090 fatcat:heg552xkw5eqboyev3sybm4dki

Reach Adaptation and Proprioceptive Recalibration Following Exposure to Misaligned Sensory Input

Erin K. Cressman, Denise Y. P. Henriques
2010 Journal of Neurophysiology  
Proprioceptive estimate task: to assess sense of felt hand position This next task (3rd box in Fig. 2A ) began with subjects grasping the handle of the robot manipulandum at the visible home position  ...  targets in a 2 visual feedback during the hand motion task (baseline or misaligned cursor) ϫ 2 time (trials completed before or after the proprioceptive estimate task) repeated measures analyses of variance  ... 
doi:10.1152/jn.01002.2009 pmid:20130036 fatcat:s3etqter7jhndpu7ghbvtdaf6a

Effort Estimates on Web Application Vulnerability Discovery

Hannes Holm, Mathias Ekstedt, Teodor Sommestad
2013 2013 46th Hawaii International Conference on System Sciences  
absence of four security measures: (i) developer web application security training, (ii) type-safe API's, (iii) black box testing tools, or (iv) static code analyzers.  ...  However, there are as of yet scarce data comparing the effectiveness of different security countermeasures or detailing the magnitude of the security issues associated with web applications.  ...  time of analysis.  ... 
doi:10.1109/hicss.2013.190 dblp:conf/hicss/HolmES13 fatcat:n4eac3ja7nh2loqkyhxz2yqddu
« Previous Showing results 1 — 15 out of 37,245 results