Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Abstract. The paper presents a set of control system scenarios implemented in two testbeds developed in the context of the European Project CRUTIAL - CRitical UTility Infrastructur...
In this paper, we present a systems approach for channel modeling of an Automatic Speech Recognition (ASR) system. This can have implications in improving speech recognition compo...
Qun Feng Tan, Kartik Audhkhasi, Panayiotis G. Geor...
Radio Frequency Identification (RFID) technology is considered to be the next step in the revolution of supplychain management, retail, and beyond. To derive real benefit from RFI...
There are many common spreadsheet errors that traditional spreadsheet systems do not help users find. This paper presents a statically-typed spreadsheet language that adds additio...
Michael J. Coblenz, Andrew Jensen Ko, Brad A. Myer...