Sciweavers

2763 search results - page 2 / 553
» The Dangerous 'All' in Specifications
Sort
View
ICDT
1997
ACM
88views Database» more  ICDT 1997»
13 years 10 months ago
Discovering All Most Specific Sentences by Randomized Algorithms
Dimitrios Gunopulos, Heikki Mannila, Sanjeev Saluj...
ACSAC
2003
IEEE
13 years 11 months ago
Honeypots: Catching the Insider Threat
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little...
Lance Spitzner
ICISS
2009
Springer
13 years 3 months ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara
IROS
2006
IEEE
127views Robotics» more  IROS 2006»
14 years 1 days ago
Performance Optimization of All-Terrain Robots: A 2D Quasi-Static Tool
- The creation of a rover for a specific task requires designing and selecting the mechanical structure specifically for its mission. This can be done by modelling a chassis and ev...
Ambroise Krebs, Thomas Thueer, Stephane Michaud, R...
IC
2004
13 years 7 months ago
IskaWeb: A Web-Based Information System for the Classification of Industrial Wastes
Industrial wastes must be classified at least two times on the way from the owner of the waste to the waste disposal facility in order to ensure that waste handling is in conformi...
J. O. Dada, Hans-Dieter Kochs, Jörg Petersen