Sciweavers

1058 search results - page 110 / 212
» It's Doomed; We Can Prove It
Sort
View
DSN
2009
IEEE
14 years 4 months ago
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Remote attestation of system integrity is an essential part of trusted computing. However, current remote attestation techniques only provide integrity proofs of static properties...
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Pen...
IEEEIAS
2009
IEEE
14 years 4 months ago
Network Security Situation Awareness Using Exponential and Logarithmic Analysis
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
Xiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping
IROS
2007
IEEE
154views Robotics» more  IROS 2007»
14 years 4 months ago
A Kalman filter-based algorithm for IMU-camera calibration
—Vision-aided inertial navigation systems (V-INSs) can provide precise state estimates for the 3-D motion of a vehicle when no external references (e.g., GPS) are available. This...
Faraz M. Mirzaei, Stergios I. Roumeliotis
TARK
2007
Springer
14 years 4 months ago
Full and relative awareness: a decidable logic for reasoning about knowledge of unawareness
In the most popular logics combining knowledge and awareness, it is not possible to express statements about knowledge of unawareness such as “Ann knows that Bill is aware of so...
Thomas Ågotnes, Natasha Alechina
HICSS
2006
IEEE
139views Biometrics» more  HICSS 2006»
14 years 4 months ago
Tools for Building Intelligent Tutoring Systems
Intelligent Tutoring Systems (ITSs) have proved useful in a variety of domains, but are notoriously resource intensive to build. We have created two programs (“tutor generatorsâ...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...