Sciweavers

3544 search results - page 443 / 709
» Information Security in Open Systems
Sort
View
AUTOMATICA
2004
70views more  AUTOMATICA 2004»
14 years 11 months ago
Output feedback control of discrete linear repetitive processes
Repetitive processes are a distinct class of 2D systems (i.e. information propagation in two independent directions) of both systems theoretic and applications interest. They cann...
Bartlomiej Sulikowski, Krzysztof Galkowski, Eric R...
CHI
2005
ACM
16 years 6 days ago
What is connected by mutual gaze?: user's behavior in video-mediated communication
Video-mediated communication systems such as teleconferencing and videophone have become popular. As with face-to-face communication, non-verbal cues such as gaze, facial expressi...
Naoki Mukawa, Tsugumi Oka, Kumiko Arai, Masahide Y...
AINA
2006
IEEE
15 years 5 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
CASES
2004
ACM
15 years 5 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
SIGIR
2004
ACM
15 years 5 months ago
Parameterized generation of labeled datasets for text categorization based on a hierarchical directory
Although text categorization is a burgeoning area of IR research, readily available test collections in this field are surprisingly scarce. We describe a methodology and system (...
Dmitry Davidov, Evgeniy Gabrilovich, Shaul Markovi...