Sciweavers

935 search results - page 150 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
IROS
2006
IEEE
138views Robotics» more  IROS 2006»
14 years 1 months ago
Hardware-in-the-loop Test Rig to Capture Aerial Robot and Sensor Suite Performance Metrics
Fully autonomous aerial robots are needed to accomplish near-Earth missions such as search and rescue, and bio-chemical sensing. Recent advances in sensor technologies ([6], [8], ...
Vefa Narli, Paul Y. Oh
USENIX
2008
13 years 10 months ago
Perspectives:  Improving SSH-style Host Authentication with Multi-Path Probing
The popularity of "Trust-on-first-use" (Tofu) authentication, used by SSH and HTTPS with self-signed certificates, demonstrates significant demand for host authenticatio...
Dan Wendlandt, David G. Andersen, Adrian Perrig
VEE
2012
ACM
215views Virtualization» more  VEE 2012»
12 years 3 months ago
SecondSite: disaster tolerance as a service
This paper describes the design and implementation of SecondSite, a cloud-based service for disaster tolerance. SecondSite extends the Remus virtualization-based high availability...
Shriram Rajagopalan, Brendan Cully, Ryan O'Connor,...
DATE
2008
IEEE
143views Hardware» more  DATE 2008»
14 years 2 months ago
Comparison of Opamp-Based and Comparator-Based Delta-Sigma Modulation
Comparator-based switched capacitor (CBSC) circuits present an alternative approach to designing sampled data systems based on the principle of detecting a virtual ground conditio...
Massoud Momeni, Petru Bogdan Bacinschi, Manfred Gl...
AICCSA
2006
IEEE
101views Hardware» more  AICCSA 2006»
14 years 1 months ago
Refactoring Tools and Complementary Techniques
Poorly designed software systems are difficult to understand and maintain. Modifying code in one place could lead to unwanted repercussions elsewhere due to high coupling. Adding ...
Martin Drozdz, Derrick G. Kourie, Bruce W. Watson,...