Sciweavers

2645 search results - page 194 / 529
» Autonomous security for autonomous systems
Sort
View
NCA
2009
IEEE
15 years 11 months ago
From Auto-adaptive to Survivable and Self-Regenerative Systems
—This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and usercontrolled reactive adaptation to highly sophisticated autonomic a...
Michael Atighetchi, Partha Pratim Pal
138
Voted
ICAC
2005
IEEE
15 years 10 months ago
FEEDBACKFLOW-An Adaptive Workflow Generator for Systems Management
FeedbackFlow is a framework that implements a general closed control loop of planning – execution result validation – re-planning, and generates workflows. In this article, we...
Artur Andrzejak, Ulf Hermann, Akhil Sahai
150
Voted
IJRR
2010
186views more  IJRR 2010»
14 years 11 months ago
An Active Vision System for Detecting, Fixating and Manipulating Objects in the Real World
The ability to autonomously acquire new knowledge through interaction with the environment is an important research topic in the field of robotics. The knowledge can only be acqui...
Babak Rasolzadeh, Mårten Björkman, Kai ...
146
Voted
ACSAC
2001
IEEE
15 years 8 months ago
A Component-Based Architecture for Secure Data Publication
We present an approach for controlling access to data publishers in the framework of Web-based information services. The paper presents a model for enforcing access control regula...
Piero A. Bonatti, Ernesto Damiani, Sabrina De Capi...
CISIS
2009
IEEE
15 years 11 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...