Sciweavers

6192 search results - page 172 / 1239
» Distributed Control of Attention
Sort
View
162
Voted
CCS
2011
ACM
14 years 3 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
156
Voted
PAMI
2012
13 years 5 months ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain
ICC
2007
IEEE
109views Communications» more  ICC 2007»
15 years 9 months ago
QoS Aware Dynamic Flow Control in Virtual Private Network
— In recent years, IP based Virtual Private Networks (IP-VPNs) which enables enterprises to dynamically create and manage privately owned virtual networks over the public network...
Fariza Sabrina, Glynn Rogers
109
Voted
IJCNN
2006
IEEE
15 years 9 months ago
Design of Optimal PI Controllers for Doubly Fed Induction Generators Driven by Wind Turbines Using Particle Swarm Optimization
– When subjected to transient disturbances in the power grid, the variable frequency converter (VFC) is the most sensitive part in the variable-speed wind turbine generator syste...
Wei Qiao, Ganesh K. Venayagamoorthy, Ronald G. Har...
CCE
2007
15 years 3 months ago
A multiple model, state feedback strategy for robust control of non-linear processes
In order to achieve global stability using well-established linear control theory and techniques, a multiple model approach has attracted increased attention in recent years. In o...
F. Y. Wang, Parisa A. Bahri, Peter L. Lee, I. T. C...