3 Serious Flaws in

نویسنده

  • Hang Dinh
چکیده

Understanding the effect of a heuristic on the time complexity of the well-known A∗ search algorithm has been a subject of a large research body in AI. Among those researches is Korf et al.’s analysis (Korf & Reid, 1998; Korf et al., 2001; Korf, 2000a; Korf, 2000b), which concluded that the effect of a heuristic is to reduce the effective depth rather than effective branching factor. Since this conclusion conflicts with both previous analysis and recent analysis by other authors, we try to investigate the causes of such contradictions and finally find out that Korf et al.’s analysis has many serious flaws from which their main conclusion was drawn.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus

Anonymity with identity escrow attempts to allow users of a service to remain anonymous, while providing the possibility that the service owner can break the anonymity in exceptional circumstances, such as to assist in a criminal investigation. A protocol for achieving anonymity with identity escrow has been presented by Marshall and Molina-Jiminez. In this paper, we show that protocol suffers ...

متن کامل

Intercepting Mobile Communications: The Insecurity of 802.11 —DRAFT—

The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from misapplication of cryptographic primitives. The flaws lead to a number of practical attacks that demonstrate that WEP fails to achieve its sec...

متن کامل

The Fall of a Tiny Star

This short paper gives a combined technical-historical account of the fate of the world’s most-used contactless smart card, the MIFARE Classic. The account concentrates on the years 2008 and 2009 when serious security flaws in the MIFARE Classic were unveiled. The story covers, besides the relevant technicalities, the risks of proprietary security mechanisms, the rights and morals wrt. publishi...

متن کامل

Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side

Cross Site Scripting (XSS) Flaws are currently the most popular security problems in modern web applications. These Flaws make use of vulnerabilities in the code of web-applications, resulting in serious consequences, such as theft of cookies, passwords and other personal credentials.Cross-Site scripting Flaws occur when accessing information in intermediate trusted sites. Client side solution ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009