Sciweavers

676 search results - page 83 / 136
» Ubiquitous command and control
Sort
View
IEEEARES
2008
IEEE
14 years 4 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin
IROS
2008
IEEE
138views Robotics» more  IROS 2008»
14 years 4 months ago
Blended local planning for generating safe and feasible paths
Abstract— Many planning approaches adhere to the twotiered architecture consisting of a long-range, low fidelity global planner and a short-range high fidelity local planner. W...
Ling Xu, Anthony Stentz
ICRA
2005
IEEE
97views Robotics» more  ICRA 2005»
14 years 3 months ago
Cognitive Based Neural Prosthetics
– Intense activity in neural prosthetic research has recently demonstrated the possibility of robotic interfaces that respond directly to the nervous system. The question remains...
Richard A. Andersen, Sam Musallam, Joel W. Burdick...
CBMS
1999
IEEE
14 years 2 months ago
Decision Support System for Multiuser Remote Microscopy in Telepathology
Recent advances in networking, robotics, and computer technology allow today realtime diagnosis, consultation, and education by using images obtained through remote microscopy. Th...
Dorin Comaniciu, Bogdan Georgescu, Peter Meer, Wen...
ASAP
2008
IEEE
120views Hardware» more  ASAP 2008»
14 years 3 days ago
Lightweight DMA management mechanisms for multiprocessors on FPGA
This paper presents a multiprocessor system on FPGA that adopts Direct Memory Access (DMA) mechanisms to move data between the external memory and the local memory of each process...
Antonino Tumeo, Matteo Monchiero, Gianluca Palermo...