Sciweavers

86 search results - page 13 / 18
» A control strategy for operating unknown constrained mechani...
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
CEC
2009
IEEE
14 years 2 months ago
Active categorical perception in an evolved anthropomorphic robotic arm
— Active perception refers to a theoretical approach to the study of perception grounded on the idea that perceiving is a way of acting, rather than a cognitive process whereby t...
Elio Tuci, Gianluca Massera, Stefano Nolfi
SRDS
2003
IEEE
14 years 1 months ago
Modeling and Detecting Failures in Next-generation Distributed Multimedia Applications
In this paper we investigate dependability issues of nextgeneration distributed multimedia applications. Examples of such applications are autonomous vehicle control, telemedicine...
Domenico Cotroneo, Cristiano di Flora, Generoso Pa...
SSS
2007
Springer
14 years 1 months ago
Stabilization in Dynamic Systems with Varying Equilibrium
System design often explores optimality of performance. What is optimal is, however, often not predefined or static in most cases, because it is affected by the context of operat...
Hui Cao, Anish Arora
RAID
2004
Springer
14 years 1 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem