Sciweavers

336 search results - page 50 / 68
» Monitoring modulo theories
Sort
View
INFOSCALE
2007
ACM
13 years 11 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü
AAAI
1998
13 years 11 months ago
Metacognition in Software Agents Using Classifier Systems
Software agents "living" and acting in a real world software environment, such as an operating system, a network, or a database system, can carry out many tasks for huma...
Zhaohua Zhang, Stan Franklin, Dipankar Dasgupta
PAMI
2007
150views more  PAMI 2007»
13 years 9 months ago
Continuous Verification Using Multimodal Biometrics
—Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the prote...
Terence Sim, Sheng Zhang, Rajkumar Janakiraman, Sa...
CONIELECOMP
2011
IEEE
13 years 1 months ago
DSRP: Distributed SensorWeb Routing Protocol
—We propose a new multi-hop routing protocol for wireless sensor networks, suited for monitoring and control applications. The aim of this research is to adapt flat and hierarch...
Abhinav Valada, David Kohanbash, George Kantor
SOUPS
2010
ACM
14 years 1 months ago
Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety
An increasing number of high-tech devices, such as driver monitoring systems and Internet usage monitoring tools, are advertised as useful or even necessary for good parenting of ...
Alexei Czeskis, Ivayla Dermendjieva, Hussein Yapit...