Search

Your search keyword '"Gilbert L. Peterson"' showing total 89 results

Search Constraints

Start Over You searched for: Author "Gilbert L. Peterson" Remove constraint Author: "Gilbert L. Peterson" Topic computer science Remove constraint Topic: computer science
89 results on '"Gilbert L. Peterson"'

Search Results

1. Exploring the Impact of Coordination in Human–Agent Teams

2. Battlespace Next(TM)

3. A development platform for behavioral flexibility in autonomous unmanned aerial systems

4. Sequence Pattern Mining with Variables

5. Creating Effective Automation to Maintain Explicit User Engagement

6. Gaming DevSecOps - A Serious Game Pilot Study

7. Exploring Provenance Needs in Software Reverse Engineering

8. Consistency and fairness in real-time distributed virtual environments: Paradigms and relationships

9. Whitelisting system state in windows forensic memory visualizations

10. Interactive Temporal Digital Forensic Event Analysis

11. Decentralized Control Strategies for Unmanned Aircraft System Pursuit and Evasion

12. The Emergence of Division of Labor in Multi-Agent Systems

13. Unified behavior framework in discrete event simulation systems

14. A dual-process Qualia Modeling Framework (QMF)

15. SensorRE: Provenance support for software reverse engineers

16. Entropy-Based Team Self-Organization with Signal Suppression

17. Digital Forensics Event Graph Reconstruction

18. A Macro-Level Order Metric for Self-Organizing Adaptive Systems

19. Feature detection and matching on atmospheric nuclear detonation video

20. A Method for Revealing and Addressing Security Vulnerabilities in Cyber-physical Systems by Modeling Malicious Agent Interactions with Formal Verification

21. Data Quality Challenges in Distributed Live-Virtual-Constructive Test Environments

22. Distributed PowerShell Load Generator (D-PLG): A Tool for Generating Dynamic Network Traffic

23. Optimizing update scheduling parameters for distributed virtual environments supporting operational test

24. A function-to-task process model for adaptive automation system design

25. Epaminondas: Exploring Combat Tactics

26. User identification and authentication using multi-modal behavioral biometrics

27. Applicability of Latent Dirichlet Allocation to multi-disk search

28. Automated Collection and Correlation of File Provenance Information

29. Clustering-Based Online Player Modeling

30. Large-scale cooperative task distribution on peer-to-peer networks

31. Activity Pattern Discovery from Network Captures

32. Malware target recognition via static heuristics

33. Windows driver memory analysis: A reverse engineering methodology

34. Extracting the windows clipboard from physical memory

35. Real-time behavior-based robot control

36. Determining Solution Space Characteristics for Real-Time Strategy Games and Characterizing Winning Strategies

37. Windows operating systems agnostic memory analysis

38. Using Modeling and Simulation to Examine the Benefits of a Network Tasking Order

39. Structured P2P technologies for distributed command and control

40. Ant clustering with locally weighted ant perception and diversified memory

42. Using Author Topic to detect insider threats from email traffic

43. QuEST for malware type-classification

44. FUZZY STATE AGGREGATION AND POLICY HILL CLIMBING FOR STOCHASTIC ENVIRONMENTS

45. A new blind method for detecting novel steganography

46. Incorporating decision-theoretic planning in a robot architecture

48. Trajectory Generation with Player Modeling

49. Timing mark detection on nuclear detonation video

50. REDIR: Automated static detection of obfuscated anti-debugging techniques

Catalog

Books, media, physical & digital resources