Sciweavers

327 search results - page 21 / 66
» Access and Use Control using Externally Controlled Reference...
Sort
View
ICCHP
2010
Springer
13 years 11 months ago
Automatic Live Monitoring of Communication Quality for Normal-Hearing and Hearing-Impaired Listeners
Abstract. This contribution presents a system, which allows for a continuous monitoring of speech intelligibility from a single microphone signal. The system accounts for the detri...
Jan Rennies, Eugen Albertin, Stefan Goetze, Jens-E...
WCNC
2008
IEEE
14 years 3 months ago
Intelligent Weather Systems with Fuzzy Logic Controller for Satellite Networks
— Weather attenuations can have a distorting effect on signal fidelity above 10 GHz that lead to excessive digital transmission error. This loss of signal is commonly referred to...
Kamal Harb, Changcheng Huang, Anand Srinivasan, Br...
ACSAC
2008
IEEE
14 years 3 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
USS
2008
13 years 11 months ago
Verifying Compliance of Trusted Programs
In this paper, we present an approach for verifying that trusted programs correctly enforce system security goals when deployed. A trusted program is trusted to only perform safe ...
Sandra Rueda, Dave King 0002, Trent Jaeger
ENGL
2007
141views more  ENGL 2007»
13 years 9 months ago
A Novel Multi-Agent Controller for Dynamic Systems based on Supervisory Loop Approach
— This paper presents a new intelligent agent supervisory loop based approach for dynamic system control. The scheme consists of three software agents that work in an autonomous ...
Sukumar Kamalasadan