Sciweavers

1540 search results - page 173 / 308
» Automotive System Design - Challenges and Potential
Sort
View
HICSS
2012
IEEE
296views Biometrics» more  HICSS 2012»
13 years 5 months ago
Topology Perturbation for Detecting Malicious Data Injection
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
ICML
2006
IEEE
15 years 10 months ago
Fast direct policy evaluation using multiscale analysis of Markov diffusion processes
Policy evaluation is a critical step in the approximate solution of large Markov decision processes (MDPs), typically requiring O(|S|3 ) to directly solve the Bellman system of |S...
Mauro Maggioni, Sridhar Mahadevan
TABLETOP
2008
IEEE
15 years 4 months ago
A field study of knowledge workers' use of interactive horizontal displays
To better understand the potential for horizontal surfaces in day-to-day work, we conducted a field study. We collected and analyzed over a month of use data from eight participan...
Meredith Ringel Morris, A. J. Bernheim Brush, Bria...
IPPS
2006
IEEE
15 years 3 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
ACSE
1997
ACM
15 years 2 months ago
Towards literate tools for novice programmers
Literate programming is a powerful technique that helps expert programmers integrate code and documentation in a manner that assists human comprehension. To date, tools for litera...
Andy Cockburn, Neville Churcher