Sciweavers

971 search results - page 120 / 195
» Autonomic Intrusion Detection System
Sort
View
ICRA
2005
IEEE
119views Robotics» more  ICRA 2005»
14 years 2 months ago
Vision Guided Landing of an Autonomous Helicopter in Hazardous Terrain
– Future robotic space missions will employ a precision soft-landing capability that will enable exploration of previously inaccessible sites that have strong scientific signific...
Andrew Edie Johnson, James F. Montgomery, Larry Ma...
ICRA
2003
IEEE
141views Robotics» more  ICRA 2003»
14 years 2 months ago
Outdoor exploration and SLAM using a compressed filter
Abstract— In this paper we describe the use of automatic exploration for autonomous mapping of outdoor scenes. We describe a real-time SLAM implementation along with an autonomou...
John Folkesson, Henrik I. Christensen
GI
2009
Springer
13 years 6 months ago
Information Fusion for Autonomous Robotic Weeding
: Information fusion has a potential applicability to a multitude of different applications. Still, the JDL model is mostly used to describe defense applications. This paper descri...
Stefan Ericson, Klas Hedenberg, Ronnie Johansson
IAAI
1990
13 years 10 months ago
AudES - An Expert System for Security Auditing
Computer security auditing constitutes an important part of any organization's security procedures. Because of the many inadequacies of currently used manual methods, thoroug...
Gene Tsudik, Rita C. Summers
IV
2002
IEEE
114views Visualization» more  IV 2002»
14 years 1 months ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike