Sciweavers

3785 search results - page 160 / 757
» Immune System Based Intrusion Detection System
Sort
View
ICRA
2005
IEEE
115views Robotics» more  ICRA 2005»
15 years 10 months ago
Real-time and Precise Self Collision Detection System for Humanoid Robots
— In this paper, we describe the real-time and precise self collision detection system that does not reduce the number of polygons and checks more than 100 collision pairs in rea...
Kei Okada, Masayuki Inaba, Hirochika Inoue
RIVF
2008
15 years 6 months ago
Quantum key distribution system using dual-threshold homodyne detection
In this work we present the principles of a flexible quantum key distribution (QKD) system using quadraturephase-shift-keying (QPSK) base and symbol encoding and dualthreshold bala...
Qing Xu 0006, Manuel Sabban, Philippe Gallion, Fra...
155
Voted
STORAGESS
2005
ACM
15 years 10 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
123
Voted
VTC
2008
IEEE
120views Communications» more  VTC 2008»
15 years 11 months ago
Low Backhaul Distributed Detection Strategies for an Interference Limited Uplink Cellular System
— This paper deals with multiuser detection through base station cooperation in uplink interference limited scenarios. At high frequency reuse, each base station not only receive...
Shahid Khattak, Gerhard Fettweis
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 11 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...