Sciweavers

8177 search results - page 1421 / 1636
» Detecting System Emulators
Sort
View
103
Voted
ICIW
2009
IEEE
15 years 10 months ago
SS-IDS: Statistical Signature Based IDS
Security of web servers has become a sensitive subject today. Prediction of normal and abnormal request is problematic due to large number of false alarms in many anomaly based In...
Payas Gupta, Chedy Raïssi, Gérard Dray...
ICRA
2009
IEEE
100views Robotics» more  ICRA 2009»
15 years 10 months ago
Three-dimensional measurement of objects in water by using space encoding method
—In this paper, a new method for 3-D measurement of objects in water is proposed. When observing objects in water through a camera contained in a waterproof housing or observing ...
Ryohei Kawai, Atsushi Yamashita, Toru Kaneko
ICSM
2009
IEEE
15 years 10 months ago
Maintenance and agile development: Challenges, opportunities and future directions
Software entropy is a phenomenon where repeated changes gradually degrade the structure of the system, making it hard to understand and maintain. This phenomenon imposes challenge...
Geir Kjetil Hanssen, Aiko Fallas Yamashita, Reidar...
IROS
2009
IEEE
168views Robotics» more  IROS 2009»
15 years 10 months ago
A stream-based hierarchical anchoring framework
— Autonomous systems situated in the real world often need to recognize, track, and reason about various types of physical objects. In order to allow reasoning at a symbolic leve...
Fredrik Heintz, Jonas Kvarnström, Patrick Doh...
ADAEUROPE
2009
Springer
15 years 10 months ago
An Experience on Ada Programming Using On-Line Judging
Abstract. Ada has proved to be one of the best languages to learn computer programming. Nevertheless, learning to program is difficult and when it is combined with lack of motivati...
Francisco J. Montoya-Dato, José Luis Fern&a...
« Prev « First page 1421 / 1636 Last » Next »