Sciweavers

861 search results - page 108 / 173
» Predicting Attack-prone Components
Sort
View
NDSS
2002
IEEE
14 years 3 months ago
Performance Analysis of TLS Web Servers
TLS is the protocol of choice for securing today’s ecommerce and online transactions, but adding TLS to a web server imposes a significant overhead relative to an insecure web ...
Cristian Coarfa, Peter Druschel, Dan S. Wallach
ICPR
2000
IEEE
14 years 2 months ago
Moving Shadow and Object Detection in Traffic Scenes
We present an algorithm for segmentation of traffic scenes that distinguishes moving objects from cast shadows. Three image features at each pixel site are considered: brightness,...
Ivana Mikic, Pamela C. Cosman, Greg T. Kogut, Moha...
METRICS
1999
IEEE
14 years 2 months ago
Measuring Coupling and Cohesion: An Information-Theory Approach
The design of software is often depicted by graphs that show components and their relationships. For example, a structure chart shows the calling relationships among components. O...
Edward B. Allen, Taghi M. Khoshgoftaar
ICRA
1998
IEEE
155views Robotics» more  ICRA 1998»
14 years 2 months ago
Reactive Visual Control of Multiple Non-Holonomic Robotic Agents
We have developed a multiagent robotic system including perception, cognition, and action components to function in a dynamicenvironment. The system involves the integration and c...
Kwun Han, Manuela M. Veloso
FLAIRS
2007
14 years 22 days ago
Towards Player Preference Modeling for Drama Management in Interactive Stories
There is a growing interest in producing story based game experiences that do not follow fixed scripts predefined by the author, but change the experience based on actions perfo...
Manu Sharma, Santiago Ontañón, Chris...