Sciweavers

329 search results - page 46 / 66
» Observability of vortex flows
Sort
View
ESORICS
2006
Springer
13 years 11 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
TROB
2002
91views more  TROB 2002»
13 years 7 months ago
Time-domain passivity control of haptic interfaces
A patent pending, energy based, method is presented for controlling a haptic interface system to ensure stable contract under a wide variety of operating conditions. System stabil...
Blake Hannaford, Jee-Hwan Ryu
SOCIALCOM
2010
13 years 5 months ago
A Decision Theoretic Approach to Data Leakage Prevention
Abstract--In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of infor...
Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakan...
KDD
2010
ACM
188views Data Mining» more  KDD 2010»
13 years 9 months ago
Inferring networks of diffusion and influence
Information diffusion and virus propagation are fundamental processes talking place in networks. While it is often possible to directly observe when nodes become infected, observi...
Manuel Gomez-Rodriguez, Jure Leskovec, Andreas Kra...
CE
2005
170views more  CE 2005»
13 years 7 months ago
Development of an environmental virtual field laboratory
Laboratory exercises, field observations and field trips are a fundamental part of many earth science and environmental science courses. Field observations and field trips can be ...
V. Ramasundaram, S. Grunwald, A. Mangeot, N. B. Co...