Sciweavers

8177 search results - page 1499 / 1636
» Detecting System Emulators
Sort
View
116
Voted
NETWORK
2007
100views more  NETWORK 2007»
15 years 3 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...
PAMI
2007
138views more  PAMI 2007»
15 years 3 months ago
A Fast Biologically Inspired Algorithm for Recurrent Motion Estimation
—We have previously developed a neurodynamical model of motion segregation in cortical visual area V1 and MT of the dorsal stream. The model explains how motion ambiguities cause...
Pierre Bayerl, Heiko Neumann
RAS
2008
84views more  RAS 2008»
15 years 3 months ago
Monitoring the execution of robot plans using semantic knowledge
Even the best laid plans can fail, and robot plans executed in real world domains tend to do so often. The ability of a robot to reliably monitor the execution of plans and detect...
Abdelbaki Bouguerra, Lars Karlsson, Alessandro Saf...
RE
2008
Springer
15 years 3 months ago
Clear justification of modeling decisions for goal-oriented requirements engineering
Representation and reasoning about goals of an information system unavoidably involve the transformation of unclear stakeholder requirements into an instance of a goal model. If t...
Ivan Jureta, Stéphane Faulkner, Pierre-Yves...
141
Voted
CCS
2010
ACM
15 years 2 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
« Prev « First page 1499 / 1636 Last » Next »