Sciweavers

2269 search results - page 392 / 454
» Behavioral Intrusion Detection
Sort
View
ICFP
2001
ACM
14 years 10 months ago
Down with Emacs Lisp: Dynamic Scope Analysis
It is possible to translate code written in Emacs Lisp or another Lisp dialect which uses dynamic scoping to a more modern programming language with lexical scoping while largely ...
Matthias Neubauer, Michael Sperber
MOBIHOC
2002
ACM
14 years 9 months ago
Performance analysis of the CONFIDANT protocol
: Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate...
Sonja Buchegger, Jean-Yves Le Boudec
EUROGRAPHICS
2010
Eurographics
14 years 7 months ago
Uncertain 2D Vector Field Topology
We introduce an approach to visualize stationary 2D vector fields with global uncertainty obtained by considering the transport of local uncertainty in the flow. For this, we ex...
Mathias Otto, Tobias Germer, Hans-Christian Hege, ...
ICPR
2010
IEEE
14 years 5 months ago
Discrimination of Moderate and Acute Drowsiness Based on Spontaneous Facial Expressions
It is important for drowsiness detection systems to warn the driver before the critical stages of drowsiness arise and thus to provide sufficient intervention time for the driver...
Esra Vural, Marian Stewart Bartlett, Gwen Littlewo...
WISTP
2010
Springer
14 years 5 months ago
Towards Electrical, Integrated Implementations of SIMPL Systems
ct This paper discusses the practical implementation of a novel security tool termed SIMPL system, which was introduced in [1]. SIMPL systems can be regarded as a public key versio...
Ulrich Rührmair, Qingqing Chen, Martin Stutzm...