Sciweavers

138 search results - page 11 / 28
» Damage control
Sort
View
CRITIS
2009
13 years 5 months ago
Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection
Abstract. With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may ...
Patrick Düssel, Christian Gehl, Pavel Laskov,...
SOSP
2005
ACM
14 years 4 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
SAB
2004
Springer
289views Optimization» more  SAB 2004»
14 years 24 days ago
An Overview of Physicomimetics
This paper provides an overview of our framework, called physicomimetics, for the distributed control of swarms of robots. We focus on robotic behaviors that are similar to those s...
William M. Spears, Diana F. Spears, Rodney Heil, W...
AAAI
1994
13 years 8 months ago
Teleassistance: Contextual Guidance for Autonomous Manipulation
We present teleassistance, a two-tiered control structure for robotic manipulation that combines the advantages of autonomy and teleoperation. At the top level, a teleoperator pro...
Polly K. Pook, Dana H. Ballard
AAAI
2004
13 years 9 months ago
SCoT: A Spoken Conversational Tutor
We describe SCoT, a Spoken Conversational Tutor, which has been implemented in order to investigate the advantages of natural language in tutoring, especially spoken language. SCo...
Karl Schultz, Brady Clark, Heather Pon-Barry, Eliz...