Sciweavers

1352 search results - page 39 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ACSW
2007
13 years 10 months ago
Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
Low latency anonymous network systems, such as Tor, were considered secure against timing attacks when the threat model does not include a global adversary. In this threat model t...
Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Sa...
IPPS
2007
IEEE
14 years 3 months ago
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC...
Derek L. Schuff, Vijay S. Pai
WSC
1998
13 years 10 months ago
Simulation and Production Planning for Manufacturing Cells
Simulation is used to verify the feasibility of the design of manufacturing cells. The cell design, which combines new and existing machines in a component manufacture, is present...
Shahram Taj, David S. Cochran, James W. Duda, Joch...
AR
2008
143views more  AR 2008»
13 years 9 months ago
Toward Human-Like Real-Time Manipulation: From Perception to Motion Planning
Human-like behavior is crucial for intelligent service robots that are to perform versatile tasks in day to day life. In this paper, an integrated approach to human-like manipulat...
Sukhan Lee, Hadi Moradi, Daesik Jang, Han-Young Ja...
IJRR
2010
173views more  IJRR 2010»
13 years 7 months ago
Planning and Implementing Trajectories for Autonomous Underwater Vehicles to Track Evolving Ocean Processes Based on Predictions
Path planning and trajectory design for autonomous underwater vehicles (AUVs) is of great importance to the oceanographic research community because automated data collection is b...
Ryan N. Smith, Yi Chao, Peggy Li, David A. Caron, ...