Sciweavers

5210 search results - page 1006 / 1042
» Computing Capabilities of Mediators
Sort
View
CCS
2007
ACM
14 years 1 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
COMPSAC
2007
IEEE
14 years 1 months ago
Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms Races
The world is increasingly dependent on critical infrastructures such as the electric power grid, water, gas, and oil transport systems, which are susceptible to cascading failures...
Travis C. Service, Daniel R. Tauritz, William M. S...
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
14 years 1 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
ICDAR
2007
IEEE
14 years 1 months ago
On the Use of Lexeme Features for Writer Verification
Document examiners use a variety of features to analyze a given handwritten document for writer verification. The challenge in the automatic classification of a pair of documents ...
A. Bhardwaj, A. Singh, Harish Srinivasan, Sargur N...
AI50
2006
14 years 1 months ago
The iCub  Cognitive Humanoid Robot: An Open-System Research Platform for Enactive Cognition
Abstract. This paper describes a multi-disciplinary initiative to promote collaborative research in enactive artificial cognitive systems by developing the iCub : a open-systems 53...
Giulio Sandini, Giorgio Metta, David Vernon
« Prev « First page 1006 / 1042 Last » Next »