Sciweavers

1270 search results - page 140 / 254
» IF Validation Environment Tutorial
Sort
View
TROB
2010
88views more  TROB 2010»
13 years 9 months ago
Proxy-Based Sliding Mode Control: A Safer Extension of PID Position Control
—High-gain proportional–integral–derivative (PID) position control involves some risk of unsafe behaviors in cases of abnormal events, such as unexpected environment contacts...
Ryo Kikuuwe, S. Yasukouchi, Hideo Fujimoto, Motoji...
WICON
2010
13 years 8 months ago
Toward Clock Skew based Wireless Sensor Node Services
Clock skew is defined as the rate of deviation of a device clock from the true time. The frequency of a device's clock actually depends on its environment, such as the tempera...
Md. Borhan Uddin, Claude Castelluccia
WISTP
2010
Springer
13 years 8 months ago
Efficient Mutual Authentication for Multi-domain RFID Systems Using Distributed Signatures
Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and r...
Michael Braun, Ulrike Meyer, Susanne Wetzel
ICUMT
2009
13 years 8 months ago
A syntactic approach for identifying multi-protocol attacks
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks. The proposed approach uses ...
Béla Genge, Piroska Haller
SIGPRO
2010
111views more  SIGPRO 2010»
13 years 5 months ago
Semi-supervised speaker identification under covariate shift
In this paper, we propose a novel semi-supervised speaker identification method that can alleviate the influence of non-stationarity such as session dependent variation, the recor...
Makoto Yamada, Masashi Sugiyama, Tomoko Matsui