Sciweavers

361 search results - page 61 / 73
» Attack Detection in Wireless Localization
Sort
View
AROBOTS
2004
127views more  AROBOTS 2004»
13 years 8 months ago
Hormone-Inspired Self-Organization and Distributed Control of Robotic Swarms
The control of robot swarming in a distributed manner is a difficult problem because global behaviors must emerge as a result of many local actions. This paper uses a bio-inspired ...
Wei-Min Shen, Peter M. Will, Aram Galstyan, Cheng-...
DAGSTUHL
2006
13 years 10 months ago
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the...
Michael Hilker, Christoph Schommer
PERCOM
2006
ACM
14 years 8 months ago
Adaptive Medical Feature Extraction for Resource Constrained Distributed Embedded Systems
Tiny embedded systems have not been an ideal outfit for high performance computing due to their constrained resources. Limitations in processing power, battery life, communication ...
Roozbeh Jafari, Hyduke Noshadi, Majid Sarrafzadeh,...
ACMSE
2004
ACM
14 years 2 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
SE
2007
13 years 10 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller