Sciweavers

796 search results - page 40 / 160
» Spoofing prevention method
Sort
View
EPIA
1995
Springer
14 years 1 months ago
Syntactic and Semantic Filtering in a Chart Parser
This paper describes a method to enhance the performance ofa unification-style bottom-up chart parser by means oftop-down filtering techniques. The filter developed consists of a s...
Sayan Bhattacharyya, Steven L. Lytinen
AAAI
2010
13 years 11 months ago
Collusion Detection in Online Bridge
Collusion is a major unsolved security problem in online bridge: by illicitly exchanging card information over the telephone, instant messenger or the like, cheaters can gain huge...
Jeff Yan
CMS
2010
118views Communications» more  CMS 2010»
13 years 10 months ago
SIP Proxies: New Reflectors in the Internet
To mitigate identity theft in SIP networks, an inter-domain authentication mechanism based on certificates is proposed in RFC 4474 [10]. Unfortunately, the design of the certificat...
Ge Zhang, Jordi Jaen Pallares, Yacine Rebahi, Simo...
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 8 months ago
Feedback control logic synthesis for non safe Petri nets
– This paper addresses the problem of forbidden states of non safe Petri Net (PN) modelling discrete events systems. To prevent the forbidden states, it is possible to use condit...
Abbas Dideban, Hassane Alla
ICRA
2010
IEEE
143views Robotics» more  ICRA 2010»
13 years 7 months ago
Tremor attenuation using FES-based joint stiffness control
In this paper, a strategy to attenuate tremor based on co-contraction of antagonist muscles using Functional Electrical Stimulation (FES) is fully presented. Both methods to track ...
Antônio Padilha Lanari Bo, Philippe Poignet