Sciweavers

18 search results - page 3 / 4
» The methodology and an application to fight against Unicode ...
Sort
View
ATAL
2008
Springer
13 years 8 months ago
Using multi-agent potential fields in real-time strategy games
Bots for Real Time Strategy (RTS) games provide a rich challenge to implement. A bot controls a number of units that may have to navigate in a partially unknown environment, while...
Johan Hagelbäck, Stefan J. Johansson
ISPEC
2007
Springer
14 years 14 days ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
ICASSP
2011
IEEE
12 years 10 months ago
ECG for blind identity verification in distributed systems
This paper discusses ECG biometric recognition in a distributed system, such as smart cards. In a setting where every card is equipped with an ECG sensor to record heart beats fro...
Jiexin Gao, Foteini Agrafioti, Hoda Mohammadzade, ...
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
13 years 11 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
CCS
2006
ACM
13 years 10 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...