Sciweavers

4651 search results - page 725 / 931
» Data Reduction Using Multiple Models Integration
Sort
View
CCS
2000
ACM
15 years 7 months ago
XML document security based on provisional authorization
The extensible markup language (XML) is a promising standard for describing semi-structured information and contents on the Internet. When XML comes to be a widespread data encodi...
Michiharu Kudo, Satoshi Hada
IJRR
2000
107views more  IJRR 2000»
15 years 2 months ago
Dynamics Simulation and Controller Interfacing for Legged Robots
Dynamics simulation can play a critical role in the engineering of robotic control code, and there exist a variety of strategies both for building physical models and for interact...
Jesse A. Reichler, Fred Delcomyn
IEEESP
2010
99views more  IEEESP 2010»
15 years 1 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
PR
2011
14 years 5 months ago
Detecting and discriminating behavioural anomalies
This paper aims to address the problem of anomaly detection and discrimination in complex behaviours, where anomalies are subtle and difficult to detect owing to the complex tempo...
Chen Change Loy, Tao Xiang, Shaogang Gong

Publication
363views
14 years 1 months ago
Detecting and Discriminating Behavioural Anomalies
This paper aims to address the problem of anomaly detection and discrimination in complex behaviours, where anomalies are subtle and difficult to detect owing to the complex tempor...
Chen Change Loy, Tao Xiang, Shaogang Gong