Sciweavers

3638 search results - page 48 / 728
» Distribution chain security
Sort
View
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
14 years 1 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
ICCV
2005
IEEE
14 years 11 months ago
Real-Time Interactively Distributed Multi-Object Tracking Using a Magnetic-Inertia Potential Model
This paper breaks with the common practice of using a joint state space representation and performing the joint data association in multi-object tracking. Instead, we present an i...
Dan Schonfeld, Magdi A. Mohamed, Wei Qu
ICML
2004
IEEE
14 years 9 months ago
Learning random walk models for inducing word dependency distributions
Many NLP tasks rely on accurately estimating word dependency probabilities P(w1|w2), where the words w1 and w2 have a particular relationship (such as verb-object). Because of the...
Kristina Toutanova, Christopher D. Manning, Andrew...
AUTONOMICS
2008
ACM
13 years 11 months ago
Tracking and tracing containers through distributed sensor middleware
In a container transport system, wireless sensor networks (WSNs) can be used for monitoring products while they are being transported. To be commercially interesting, these WSNs m...
Klaas Thoelen, Sam Michiels, Wouter Joosen
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 9 months ago
Approaching Throughput-optimality in Distributed CSMA Scheduling Algorithms with Collisions
Abstract--It was shown recently that carrier sense multiple access (CSMA)-like distributed algorithms can achieve the maximal throughput in wireless networks (and task processing n...
Libin Jiang, Jean C. Walrand