Sciweavers

752 search results - page 84 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
140
Voted
CORR
2010
Springer
160views Education» more  CORR 2010»
15 years 3 months ago
PCA 4 DCA: The Application Of Principal Component Analysis To The Dendritic Cell Algorithm
As one of the newest members in the field of artificial immune systems (AIS), the Dendritic Cell Algorithm (DCA) is based on behavioural models of natural dendritic cells (DCs). U...
Feng Gu, Julie Greensmith, Robert Oates, Uwe Aicke...
176
Voted
SOUPS
2010
ACM
15 years 7 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
ECCV
2002
Springer
16 years 5 months ago
Eye Gaze Correction with Stereovision for Video-Teleconferencing
Abstract. The lack of eye contact in desktop video teleconferencing substantially reduces the effectiveness of video contents. While expensive and bulky hardware is available on th...
Ruigang Yang, Zhengyou Zhang
117
Voted
WSC
2000
15 years 4 months ago
Simulation as educational support for production and logistics in industrial engineering
The proposed implementation is a monitor system able to train operators for on-line real time manufacturing control in order to analyze the performance of a production process. Th...
Agostino G. Bruzzone, Pietro Giribone, Roberto Rev...
145
Voted
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...