Sciweavers

2098 search results - page 334 / 420
» Data Futures in DISCWorld
Sort
View
109
Voted
EMNETS
2007
15 years 7 months ago
SeeDTV: deployment-time validation for wireless sensor networks
Deployment of a wireless sensor network (WSN) system is a critical step because theoretical models and assumptions often differ from real environmental characteristics and perform...
H. Liu, Leo Selavo, John A. Stankovic
119
Voted
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
15 years 7 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
132
Voted
HRI
2007
ACM
15 years 7 months ago
On-line behaviour classification and adaptation to human-robot interaction styles
This paper presents a proof-of-concept of a robot that is adapting its behaviour on-line, during interactions with a human according to detected play styles. The study is part of ...
Dorothée François, Daniel Polani, Ke...
114
Voted
ACCV
2006
Springer
15 years 7 months ago
Key Frame-Based Activity Representation Using Antieigenvalues
Many activities may be characterized by a sequence of key frames that are related to important changes in motion rather than dominant characteristics that persist over a long seque...
Naresh P. Cuntoor, Rama Chellappa
131
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee