Sciweavers

469 search results - page 69 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
BVAI
2007
Springer
14 years 2 months ago
Non-invasive Brain-Actuated Interaction
The promise of Brain-Computer Interfaces (BCI) technology is to augment human capabilities by enabling interaction with computers through a conscious and spontaneous modulation of ...
José del R. Millán, Pierre W. Ferrez...
IFIP
1999
Springer
14 years 21 days ago
Management and optimization of multiple supply chains
Supply Chain Management (SCM) plans and controls the production over a group of autonomous enterprises. Process-oriented design is used to eliminate inefficiencies of the chain on...
J. Dorn
HASE
1997
IEEE
14 years 20 days ago
ReSoFT: A Reusable Testbed for Development and Evaluation of Software Fault-Tolerant Systems
The Reusable Software Fault Tolerance Testbed ReSoFT was developed to facilitate the development and evaluation of high-assurance systems that require tolerance of both hardware...
Kam S. Tso, Eltefaat Shokri, Roger J. Dziegiel Jr.
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
14 years 19 days ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
ALP
1992
Springer
14 years 16 days ago
Definitional Trees
Rewriting is a computational paradigm that specifies the actions, but not the control. We introduce a hierarchical structure repreat a high level of abstraction, a form of control....
Sergio Antoy