Sciweavers

1737 search results - page 282 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
TSMC
1998
99views more  TSMC 1998»
15 years 2 months ago
Learning visually guided grasping: a test case in sensorimotor learning
Abstract—We present a general scheme for learning sensorimotor tasks which allows rapid on-line learning and generalization of the learned knowledge to unfamiliar objects. The sc...
Ishay Kamon, Tamar Flash, Shimon Edelman
137
Voted
MOBICOM
2004
ACM
15 years 7 months ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra
99
Voted
FC
2009
Springer
112views Cryptology» more  FC 2009»
15 years 9 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
RAID
2004
Springer
15 years 7 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...
CLEF
2007
Springer
15 years 8 months ago
Domain-Specific IR for German, English and Russian Languages
In participating in this CLEF evaluation campaign, our first objective is to propose and evaluate various indexing and search strategies for the Russian language, in order to obta...
Claire Fautsch, Ljiljana Dolamic, Samir Abdou, Jac...