Sciweavers

8177 search results - page 1427 / 1636
» Detecting System Emulators
Sort
View
IROS
2008
IEEE
181views Robotics» more  IROS 2008»
15 years 10 months ago
Scalable Bayesian human-robot cooperation in mobile sensor networks
— In this paper, scalable collaborative human-robot systems for information gathering applications are approached as a decentralized Bayesian sensor network problem. Humancompute...
Frédéric Bourgault, Aakash Chokshi, ...
IROS
2008
IEEE
185views Robotics» more  IROS 2008»
15 years 10 months ago
A clickable world: Behavior selection through pointing and context for mobile manipulation
— We present a new behavior selection system for human-robot interaction that maps virtual buttons overlaid on the physical environment to the robot’s behaviors, thereby creati...
Hai Nguyen, Advait Jain, Cressel D. Anderson, Char...
LCN
2008
IEEE
15 years 10 months ago
DiCAP: Distributed Packet Capturing architecture for high-speed network links
— IP traffic measurements form the basis of several network management tasks, such as accounting, planning, intrusion detection, and charging. High-speed network links challenge ...
Cristian Morariu, Burkhard Stiller
PIMRC
2008
IEEE
15 years 10 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 10 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...
« Prev « First page 1427 / 1636 Last » Next »