Sciweavers

165 search results - page 20 / 33
» Building Strong Semi-Autonomous Systems
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 4 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
14 years 2 months ago
Towards Feasible Topology Formation Algorithms for Bluetooth-based WPANs
In this paper, we tackle the problem of topology formation in Bluetooth Wireless Personal Area Networks (BTWPANs). We first overview and extend a previously proposed centralized ...
Carla-Fabiana Chiasserini, Marco Ajmone Marsan, El...
LREC
2010
147views Education» more  LREC 2010»
13 years 11 months ago
Learning Recursive Segments for Discourse Parsing
Automatically detecting discourse segments is an important preliminary step towards full discourse parsing. Previous research on discourse segmentation have relied on the assumpti...
Stergos D. Afantenos, Pascal Denis, Philippe Mulle...
ENTCS
2008
106views more  ENTCS 2008»
13 years 9 months ago
Reduction Semantics and Formal Analysis of Orc Programs
Orc is a language for orchestration of web services developed by J. Misra that offers simple, yet powerful and elegant, constructs to program sophisticated web orchestration appli...
Musab AlTurki, José Meseguer
GIS
2009
ACM
14 years 2 months ago
REG^2: a regional regression framework for geo-referenced datasets
Traditional regression analysis derives global relationships between variables and neglects spatial variations in variables. Hence they lack the ability to systematically discover...
Oner Ulvi Celepcikay, Christoph F. Eick