Sciweavers

439 search results - page 86 / 88
» An Evaluation Framework for Plagiarism Detection
Sort
View
ICRA
2009
IEEE
156views Robotics» more  ICRA 2009»
15 years 4 months ago
Human brain-teleoperated robot between remote places
Abstract— This paper describes an EEG-based human brainactuated robotic system, which allows performing navigation and visual exploration tasks between remote places via internet...
Carlos Escolano, Javier M. Antelis, Javier Minguez
IPPS
2008
IEEE
15 years 3 months ago
Software monitoring with bounded overhead
In this paper, we introduce the new technique of HighConfidence Software Monitoring (HCSM), which allows one to perform software monitoring with bounded overhead and concomitantl...
Sean Callanan, David J. Dean, Michael Gorbovitski,...
ICNP
2006
IEEE
15 years 3 months ago
Characterizing and Mitigating Inter-domain Policy Violations in Overlay Routes
— The Internet is a complex structure arising from the interconnection of numerous autonomous systems (AS), each exercising its own administrative policies to reflect the commer...
Srinivasan Seetharaman, Mostafa H. Ammar
HT
2006
ACM
15 years 3 months ago
HT06, tagging paper, taxonomy, Flickr, academic article, to read
In recent years, tagging systems have become increasingly popular. These systems enable users to add keywords (i.e., “tags”) to Internet resources (e.g., web pages, images, vi...
Cameron Marlow, Mor Naaman, Danah Boyd, Marc Davis
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 3 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...