Sciweavers

675 search results - page 9 / 135
» New reals: Can live with them, can live without them
Sort
View
EUROSEC
2009
ACM
14 years 2 months ago
Application-based TCP hijacking
We present application-based TCP hijacking (ABTH), a new attack on TCP applications that exploits flaws due to the interplay between TCP and application protocols to inject data ...
Oliver Zheng, Jason Poon, Konstantin Beznosov
IJRR
2008
106views more  IJRR 2008»
13 years 7 months ago
Cooperative Cleaners: A Study in Ant Robotics
Abstract. In the world of living creatures, "simple minded" animals often cooperate to achieve common goals with amazing performance. One can consider this idea in the co...
Israel A. Wagner, Yaniv Altshuler, Vladimir Yanovs...
TCAD
1998
82views more  TCAD 1998»
13 years 7 months ago
Structural methods for the synthesis of speed-independent circuits
Most existing tools for the synthesisof asynchronouscircuits from Signal Transition Graphs (STGs) derive the reachability graph for the calculation of logic equations. This paper ...
Enric Pastor, Jordi Cortadella, Alex Kondratyev, O...
ICCV
2001
IEEE
14 years 9 months ago
Real-Time Tracking of Highly Articulated Structures in the Presence of Noisy Measurements
This paper presents a novel approach for model-based realtime tracking of highly articulated structures such as humans. This approach is based on an algorithm which efficiently pr...
Tom Drummond, Roberto Cipolla
CDC
2010
IEEE
118views Control Systems» more  CDC 2010»
13 years 2 months ago
A state-based framework for supervisory control synthesis and verification
We extend an existing model-based framework for supervisory control synthesis with generalized control and verification state-based requirements. The former stem from the need for ...
Jasen Markovski, Dirk A. van Beek, Rolf J. M. Theu...