Sciweavers

536 search results - page 22 / 108
» paste 2010
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Predictive Blacklisting as an Implicit Recommendation System
A widely used defense practice against malicious traffic on the Internet is to maintain blacklists, i.e., lists of prolific attack sources that have generated malicious activity in...
Fabio Soldo, Anh Le, Athina Markopoulou
CDC
2010
IEEE
210views Control Systems» more  CDC 2010»
13 years 3 months ago
Advances in moving horizon estimation for nonlinear systems
In the past decade, moving horizon estimation (MHE) has emerged as a powerful technique for estimating the state of a dynamical system in the presence of nonlinearities and disturb...
Angelo Alessandri, Marco Baglietto, Giorgio Battis...
TITS
2010
110views Education» more  TITS 2010»
13 years 3 months ago
Research Collaboration and ITS Topic Evolution: 10 Years at T-ITS
This paper investigates the collaboration patterns and research topic trends in the publications of the IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (T-ITS) over the pas...
Linjing Li, Xin Li, Changjian Cheng, Cheng Chen, G...
IEEEMM
2010
102views more  IEEEMM 2010»
13 years 7 months ago
Printing in a Digital Age
:  Printing in a Digital Age Qian Lin, Jerry Liu, Daniel Tretter HP Laboratories HPL-2010-113 Paper has been used as an information medium for almost two thousand years. But dur...
Qian Lin, Jerry Liu, Daniel Tretter
CAV
2010
Springer
153views Hardware» more  CAV 2010»
14 years 15 days ago
There's Plenty of Room at the Bottom: Analyzing and Verifying Machine Code
This paper discusses the obstacles that stand in the way of doing a good job of machine-code analysis. Compared with analysis of source code, the challenge is to drop all assumptio...
Thomas W. Reps, Junghee Lim, Aditya V. Thakur, Gog...