Sciweavers

92 search results - page 10 / 19
» Active Audition for Humanoid
Sort
View
FAST
2009
14 years 9 months ago
Steps Toward Managing Lineage Metadata in Grid Clusters
The lineage of a piece of data is of utility to a wide range of domains. Several application-specific extensions have been built to facilitate tracking the origin of the output th...
Ashish Gehani, Minyoung Kim, Jian Zhang
ACMSE
2006
ACM
15 years 5 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 4 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
IJMI
2007
140views more  IJMI 2007»
14 years 11 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
CHI
2009
ACM
16 years 8 days ago
Tactile motion instructions for physical activities
While learning new motor skills, we often rely on feedback from a trainer. Auditive feedback and demonstrations are used most frequently, but in many domains they are inappropriat...
Daniel Spelmezan, Mareike Jacobs, Anke Hilgers, Ja...