Sciweavers

2097 search results - page 341 / 420
» Distributed user modelling for universal information access
Sort
View
TMA
2010
Springer
150views Management» more  TMA 2010»
15 years 2 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
15 years 8 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
EATIS
2009
ACM
15 years 7 months ago
Agent based smart house platform with affective control
In this paper, we describe our work in developing an agent based smart house platform using TAOM4E development methodology and the JADE-platform with the Jadex-extension. In order...
Kuderna-Iulian Benta, Amalia Hoszu, Lucia Vacariu,...
ACMACE
2005
ACM
15 years 6 months ago
Heat sensation in image creation with thermal vision
We introduce how to involve the heat sensation in image creation by using thermal vision. We develop ”ThermoTablet” which can detect touch regions of physical input objects on...
Daisuke Iwai, Kosuke Sato
HAPTICS
2003
IEEE
15 years 9 months ago
Performance and Co-Presence in Heterogeneous Haptic Collaboration
Based on a distributed architecture for real-time collection and broadcast of haptic information to multiple participants, heterogeneous haptic devices (the PHANToM and the CyberG...
Margaret McLaughlin, Gaurav S. Sukhatme, Wei Peng,...