Sciweavers

2269 search results - page 396 / 454
» Behavioral Intrusion Detection
Sort
View
IAT
2008
IEEE
14 years 4 months ago
An Ontology-Driven Framework for Deploying JADE Agent Systems
Multi-agent systems have proven to be a powerful technology for building complex distributed applications. However, the process of designing, configuring and deploying agent-based...
Csongor Nyulas, Martin J. O'Connor, Samson W. Tu, ...
ICCCN
2008
IEEE
14 years 4 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
ICRA
2008
IEEE
146views Robotics» more  ICRA 2008»
14 years 4 months ago
Exploration of an incremental suite of microscopic models for acoustic event monitoring using a robotic sensor network
— Simulation is frequently used in the study of multi-agent systems. Unfortunately, in many cases, it is not necessarily clear how faithfully the details of the simulated model r...
Christopher M. Cianci, Jim Pugh, Alcherio Martinol...
ISCAS
2008
IEEE
286views Hardware» more  ISCAS 2008»
14 years 4 months ago
A brain-machine interface using dry-contact, low-noise EEG sensors
Abstract— Electroencephalograph (EEG) recording systems offer a versatile, non-invasive window on the brain’s spatiotemporal activity for many neuroscience and clinical applica...
Thomas J. Sullivan, Stephen R. Deiss, Tzyy-Ping Ju...
KBSE
2008
IEEE
14 years 4 months ago
Testing Peers' Volatility
—Peer-to-peer (P2P) is becoming a key technology for software development, but still lacks integrated solutions to build trust in the final software, in terms of correctness and...
Eduardo Cunha de Almeida, Gerson Sunyé, Yve...