Sciweavers

1317 search results - page 191 / 264
» A new delay system approach to network-based control
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
14 years 1 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
SEFM
2005
IEEE
14 years 2 months ago
Formal Analysis of Human-computer Interaction using Model-checking
Experiments with simulators allow psychologists to better understand the causes of human errors and build models of cognitive processes to be used in Human Reliability Assessment ...
Antonio Cerone, Peter A. Lindsay, Simon Connelly
ASPDAC
1998
ACM
105views Hardware» more  ASPDAC 1998»
14 years 1 months ago
Techniques for Functional Test Pattern Execution
Functional debugging often dominates the time and cost of the ASIC system development, mainly due to the limited controllability and observability of the storage elements in desig...
Inki Hong, Miodrag Potkonjak
TROB
2010
159views more  TROB 2010»
13 years 3 months ago
Task-Specific Generalization of Discrete and Periodic Dynamic Movement Primitives
Abstract--Acquisition of new sensorimotor knowledge by imitation is a promising paradigm for robot learning. To be effective, action learning should not be limited to direct replic...
Ales Ude, Andrej Gams, Tamim Asfour, Jun Morimoto
ANSOFT
1999
74views more  ANSOFT 1999»
13 years 8 months ago
On Coping with Real-Time Software Dynamic Inconsistency by Built-in Tests
In real-time systems, dynamic inconsistencies of software are hardly detected, diagnosed and handled. A built-in test (BIT) method is developed to cope with software dynamic incon...
Yingxu Wang, Graham King, Dilip Patel, Shushma Pat...