Sciweavers

10435 search results - page 2015 / 2087
» Measuring system normality
Sort
View
IROS
2006
IEEE
202views Robotics» more  IROS 2006»
14 years 2 months ago
Topological characterization of mobile robot behavior
— We propose to classify the behaviors of a mobile robot thanks to topological methods as an alternative to metric ones. To do so, we adapt an analysis scheme from Physics of non...
Aurélien Hazan, Frédéric Dave...
ISWC
2006
IEEE
14 years 2 months ago
User Localization Using Wearable Electromagnetic Tracker and Orientation Sensor
This paper describes a localization method with wearable electromagnetic sensor and orientation sensor for wearable computer users. Many user localization methods have been invest...
Akihiro Hamaguchi, Masayuki Kanbara, Naokazu Yokoy...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 2 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
TRIDENTCOM
2006
IEEE
14 years 2 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
ACMMSP
2006
ACM
260views Hardware» more  ACMMSP 2006»
14 years 2 months ago
Seven at one stroke: results from a cache-oblivious paradigm for scalable matrix algorithms
A blossoming paradigm for block-recursive matrix algorithms is presented that, at once, attains excellent performance measured by • time, • TLB misses, • L1 misses, • L2 m...
Michael D. Adams, David S. Wise
« Prev « First page 2015 / 2087 Last » Next »