Sciweavers

957 search results - page 148 / 192
» From Margin to Sparsity
Sort
View
ICICS
2009
Springer
14 years 2 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
CDC
2008
IEEE
126views Control Systems» more  CDC 2008»
14 years 2 months ago
Open and emerging control problems in tokamak plasma control
— The tokamak concept for magnetic confinement of fusion plasmas is now quite mature scientifically. This maturity is evidenced by the ongoing worldwide effort to design and cons...
M. L. Walker, Eugenio Schuster, Didier Mazon, Didi...
IROS
2008
IEEE
126views Robotics» more  IROS 2008»
14 years 2 months ago
An optical external localization system and applications to indoor tracking
— Precise robot positioning is important for many applications in indoor environments. Current solutions to the indoor localization problem are either both unreliable and inaccur...
Srujan Linga, Binayak Roy, H. Harry Asada, Daniela...
P2P
2008
IEEE
14 years 2 months ago
Faster Content Access in KAD
Many different Distributed Hash Tables (DHTs) have been designed, but only few have been successfully deployed. The implementation of a DHT needs to deal with practical aspects (e...
Moritz Steiner, Damiano Carra, Ernst W. Biersack
COMSWARE
2007
IEEE
14 years 2 months ago
Sensor Network Deployment For Agronomical Data Gathering in Semi-Arid Regions
— We share our experience in planning, designing and deploying a wireless sensor network of one square kilometre area. Environmental data such as soil moisture, temperature, baro...
Tamma V. Prabhakar, N. V. Chalapathi Rao, M. S. Su...