Sciweavers

1448 search results - page 246 / 290
» Deadlock Detection in Distributed Systems
Sort
View
NSPW
2003
ACM
15 years 9 months ago
Locality: a new paradigm for thinking about normal behavior and outsider threat
Locality as a unifying concept for understanding the normal behavior of benign users of computer systems is suggested as a unifying paradigm that will support the detection of mal...
John McHugh, Carrie Gates
ATAL
1999
Springer
15 years 8 months ago
A Planning Component for RETSINA Agents
In the RETSINA multi-agent system, each agent is provided with an internal planning component—the RETSINA planner. Each agent, using its internal planner, formulates detailed pla...
Massimo Paolucci, Onn Shehory, Katia P. Sycara, Di...
EUROCAST
2007
Springer
190views Hardware» more  EUROCAST 2007»
15 years 8 months ago
Efficient On-Board Stereo Vision Pose Estimation
Abstract. This paper presents an efficient technique for real time estimation of on-board stereo vision system pose. The whole process is performed in the Euclidean space and consi...
Angel Domingo Sappa, Fadi Dornaika, David Ger&oacu...
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
15 years 8 months ago
Curvewise DET Confidence Regions and Pointwise EER Confidence Intervals Using Radial Sweep Methodology
One methodology for evaluating the matching performance of biometric authentication systems is the detection error tradeoff (DET) curve. The DET curve graphically illustrates the r...
Michael E. Schuckers, Yordan Minev, Andy Adler
HOTOS
2009
IEEE
15 years 8 months ago
An End to the Middle
The last fifteen years has seen a vast proliferation of middleboxes to solve all manner of persistent limitations in the Internet protocol suite. Examples include firewalls, NATs,...
Colin Dixon, Arvind Krishnamurthy, Thomas E. Ander...