Sciweavers

2098 search results - page 334 / 420
» Data Futures in DISCWorld
Sort
View
EMNETS
2007
14 years 1 months ago
SeeDTV: deployment-time validation for wireless sensor networks
Deployment of a wireless sensor network (WSN) system is a critical step because theoretical models and assumptions often differ from real environmental characteristics and perform...
H. Liu, Leo Selavo, John A. Stankovic
SP
2010
IEEE
212views Security Privacy» more  SP 2010»
14 years 1 months ago
State of the Art: Automated Black-Box Web Application Vulnerability Testing
—Black-box web application vulnerability scanners are automated tools that probe web applications for security vulnerabilities. In order to assess the current state of the art, w...
Jason Bau, Elie Bursztein, Divij Gupta, John C. Mi...
HRI
2007
ACM
14 years 1 months ago
On-line behaviour classification and adaptation to human-robot interaction styles
This paper presents a proof-of-concept of a robot that is adapting its behaviour on-line, during interactions with a human according to detected play styles. The study is part of ...
Dorothée François, Daniel Polani, Ke...
ACCV
2006
Springer
14 years 1 months ago
Key Frame-Based Activity Representation Using Antieigenvalues
Many activities may be characterized by a sequence of key frames that are related to important changes in motion rather than dominant characteristics that persist over a long seque...
Naresh P. Cuntoor, Rama Chellappa
ACSAC
2004
IEEE
14 years 1 months ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee