Sciweavers

438 search results - page 52 / 88
» Defending Critical Infrastructure
Sort
View
HICSS
2009
IEEE
120views Biometrics» more  HICSS 2009»
14 years 3 months ago
Trapping Malicious Insiders in the SPDR Web
The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...
PAM
2009
Springer
14 years 3 months ago
Queen: Estimating Packet Loss Rate between Arbitrary Internet Hosts
Estimate of packet-loss rates between arbitrary Internet hosts is critical for many large-scale distributed applications, including overlay routing, P2P media streaming, VoIP, and ...
Angela Wang, Cheng Huang, Jin Li, Keith W. Ross
IROS
2009
IEEE
151views Robotics» more  IROS 2009»
14 years 3 months ago
Simultaneous people tracking and localization for social robots using external laser range finders
—Robust localization of robots and reliable tracking of people are both critical requirements for the deployment of service robots in real-world environments. In crowded public s...
Dylan F. Glas, Takayuki Kanda, Hiroshi Ishiguro, N...
ISORC
2009
IEEE
14 years 3 months ago
Extended RT-Component Framework for RT-Middleware
Modular component-based robot systems require not only an infrastructure for component management, but also scalability as well as real-time properties. Robot Technology (RT)-Midd...
Hiroyuki Chishiro, Yuji Fujita, Akira Takeda, Yuta...
WEBI
2009
Springer
14 years 3 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham