Sciweavers

2092 search results - page 277 / 419
» A Theory of Non-Deterministic Networks
Sort
View
ICRA
2008
IEEE
143views Robotics» more  ICRA 2008»
15 years 6 months ago
Pattern generators with sensory feedback for the control of quadruped locomotion
— Central Pattern Generators (CPGs) are becoming a popular model for the control of locomotion of legged robots. Biological CPGs are neural networks responsible for the generatio...
Ludovic Righetti, Auke Jan Ijspeert
ESORICS
2007
Springer
15 years 6 months ago
Change-Impact Analysis of Firewall Policies
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...
Alex X. Liu
DASC
2006
IEEE
15 years 5 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
SP
2006
IEEE
15 years 5 months ago
Locating Hidden Servers
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Wit...
Lasse Øverlier, Paul F. Syverson
HICSS
2003
IEEE
117views Biometrics» more  HICSS 2003»
15 years 5 months ago
The German Mobile Standards Battle
The diffusion of innovations has long been a research domain in IS research. Yet, there is no sound theory nor practice to fully understand the complex mechanisms behind networks ...
Roman Beck, Daniel Beimborn, Tim Weitzel