Sciweavers

1424 search results - page 255 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ICRA
2007
IEEE
148views Robotics» more  ICRA 2007»
15 years 7 months ago
Seamless Execution of Action Sequences
— One of the most notable and recognizable features of robot motion is the abrupt transitions between actions in action sequences. In contrast, humans and animals perform sequenc...
Freek Stulp, Wolfram Koska, Alexis Maldonado, Mich...
ESORICS
2007
Springer
15 years 7 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
HICSS
2006
IEEE
93views Biometrics» more  HICSS 2006»
15 years 7 months ago
Presenting the Past: A Framework for Facilitating the Externalization and Articulation of User Activities in Desktop Environment
Work processes are conducted in various contexts and they involve different tasks, interruptions, activities and actions. In all of these, tacit knowledge plays a part. Some part ...
Kimmo Wideroos, Samuli Pekkola
ISPD
2006
ACM
68views Hardware» more  ISPD 2006»
15 years 7 months ago
Solving hard instances of floorplacement
Physical Design of modern systems on chip is extremely challenging. Such digital integrated circuits often contain tens of millions of logic gates, intellectual property blocks, e...
Aaron N. Ng, Igor L. Markov, Rajat Aggarwal, Venky...
JCDL
2006
ACM
116views Education» more  JCDL 2006»
15 years 7 months ago
Enabling exploration: travelers in the middle east archive
In this paper, we describe the Travelers in the Middle East Archive (TIMEA), a digital archive focused on Western explorations in the Middle East between the 18th and early 20th c...
Lisa M. Spiro, Marie Wise, Geneva L. Henry, Chuck ...