Sciweavers

320 search results - page 21 / 64
» An approach for implicitly detecting information needs
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
CN
2007
96views more  CN 2007»
13 years 7 months ago
Persistent detection and recovery of state inconsistencies
Soft-state is a well established approach to designing robust network protocols and applications. However it is unclear how to apply soft-state approach to protocols that must mai...
Lan Wang, Daniel Massey, Lixia Zhang
ISCA
2008
IEEE
185views Hardware» more  ISCA 2008»
13 years 7 months ago
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely...
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chu...
ROBOCUP
2009
Springer
128views Robotics» more  ROBOCUP 2009»
14 years 2 months ago
Sensor and Information Fusion Applied to a Robotic Soccer Team
This paper is focused on the sensor and information fusion techniques used by a robotic soccer team. Due to the fact that the sensor information is affected by noise, and taking in...
João Silva, Nuno Lau, João Rodrigues...
ICRA
2010
IEEE
226views Robotics» more  ICRA 2010»
13 years 6 months ago
Indoor scene recognition through object detection
Abstract— Scene recognition is a highly valuable perceptual ability for an indoor mobile robot, however, current approaches for scene recognition present a significant drop in p...
Pablo Espinace, Thomas Kollar, Alvaro Soto, Nichol...