Sciweavers

5423 search results - page 1071 / 1085
» Denial-of-service in automation systems
Sort
View
HRI
2009
ACM
14 years 3 months ago
How search and its subtasks scale in N robots
The present study investigates the effect of the number of controlled robots on performance of an urban search and rescue (USAR) task using a realistic simulation. Participants co...
Huadong Wang, Michael Lewis, Prasanna Velagapudi, ...
SAC
2009
ACM
14 years 3 months ago
An empirical study of incorporating cost into test suite reduction and prioritization
Software developers use testing to gain and maintain confidence in the correctness of a software system. Automated reduction and prioritization techniques attempt to decrease the...
Adam M. Smith, Gregory M. Kapfhammer
TEI
2009
ACM
95views Hardware» more  TEI 2009»
14 years 3 months ago
Living interfaces: the intimate door lock
In this paper we introduce a new way to interact intimately with an automated system. The Intimate Door Lock investigates the psychological effects of intimate humanhuman interact...
Miriam Roy, Fabian Hemmert, Reto Wettach
CCS
2009
ACM
14 years 3 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
GIS
2009
ACM
14 years 3 months ago
Trajectory simplification method for location-based social networking services
The increasing availabilities of GPS-enabled devices have given rise to the location-based social networking services (LBSN), in which users can record their travel experiences wi...
Yukun Chen, Kai Jiang, Yu Zheng, Chunping Li, Neng...
« Prev « First page 1071 / 1085 Last » Next »