Sciweavers

5948 search results - page 1159 / 1190
» Computing Robust Counter-Strategies
Sort
View
CODES
2006
IEEE
15 years 3 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
GMP
2006
IEEE
15 years 3 months ago
Subdivision Termination Criteria in Subdivision Multivariate Solvers
Abstract. The need for robust solutions for sets of non-linear multivariate constraints or equations needs no motivation. Subdivision-based multivariate constraint solvers [1–3] ...
Iddo Hanniel, Gershon Elber
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
15 years 3 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
ICPADS
2006
IEEE
15 years 3 months ago
Oriented Overlays For Clustering Client Requests To Data-Centric Network Services
Many of the data-centric network services deployed today hold massive volumes of data at their origin websites, and access the data to dynamically generate responses to user reque...
Congchun He, Vijay Karamcheti
ICRA
2006
IEEE
180views Robotics» more  ICRA 2006»
15 years 3 months ago
Development of Wearable Sensor Combinations for Human Lower Extremity Motion Analysis
– A wearable sensory system for human lower extremity motion analysis is proposed, and an intelligent computation method for this sensory system is presented. The standard method...
Tao Liu, Yoshio Inoue, Kyoko Shibata, Haruhiko Mor...
« Prev « First page 1159 / 1190 Last » Next »