Sciweavers

1123 search results - page 192 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
CMSB
2009
Springer
15 years 8 months ago
On Coupling Models Using Model-Checking: Effects of Irinotecan Injections on the Mammalian Cell Cycle
Abstract. In systems biology, the number of models of cellular processes increases rapidly, but re-using models in different contexts or for different questions remains a challengi...
Elisabetta De Maria, François Fages, Sylvai...
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 5 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
JAIR
2002
120views more  JAIR 2002»
15 years 3 months ago
Learning Geometrically-Constrained Hidden Markov Models for Robot Navigation: Bridging the Topological-Geometrical Gap
Hidden Markov models hmms and partially observable Markov decision processes pomdps provide useful tools for modeling dynamical systems. They are particularly useful for represent...
Hagit Shatkay, Leslie Pack Kaelbling
COOPIS
2002
IEEE
15 years 9 months ago
An Adaptive Scheduling Service for Real-Time CORBA
CORBA is an important standard middleware used in the development of distributed applications. It has also been used with distributed real-time applications, through its extension ...
Alexandre Cervieri, Rômulo Silva de Oliveira...
171
Voted
PERCOM
2009
ACM
15 years 11 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...