Sciweavers

192 search results - page 31 / 39
» Constraint-Based Approach for Analysis of Hybrid Systems
Sort
View
ICARCV
2006
IEEE
148views Robotics» more  ICARCV 2006»
14 years 1 months ago
Switched Linear Control of a Model Helicopter
—A mini scale helicopter poses a difficult control problem due to its complex dynamics. Compared to its full-size counterparts, the model helicopter exhibits not only increased s...
Herman Y. Sutarto, Agus Budiyono, Endra Joelianto,...
RAID
2007
Springer
14 years 2 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
IJSN
2006
124views more  IJSN 2006»
13 years 7 months ago
Wireless networking security: open issues in trust, management, interoperation and measurement
: The pervasive availability and wide usage of wireless networks with different kinds of topologies, techniques and protocol suites have brought with them a need to improve securit...
Joseph B. Evans, Weichao Wang, Benjamin J. Ewy
IUI
2010
ACM
14 years 2 months ago
Automatically identifying targets users interact with during real world tasks
Information about the location and size of the targets that users interact with in real world settings can enable new innovations in human performance assessment and software usab...
Amy Hurst, Scott E. Hudson, Jennifer Mankoff
CLEF
2010
Springer
13 years 9 months ago
External and Intrinsic Plagiarism Detection Using a Cross-Lingual Retrieval and Segmentation System - Lab Report for PAN at CLEF
We present our hybrid system for the PAN challenge at CLEF 2010. Our system performs plagiarism detection for translated and non-translated externally as well as intrinsically plag...
Markus Muhr, Roman Kern, Mario Zechner, Michael Gr...