Sciweavers

3008 search results - page 40 / 602
» Information and Control in Gray-Box Systems
Sort
View
CDC
2010
IEEE
110views Control Systems» more  CDC 2010»
14 years 4 months ago
The Wireless Control Network: Synthesis and robustness
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. Traditional networked control schemes are designed with one of the nodes in th...
Miroslav Pajic, Shreyas Sundaram, Jerome Le Ny, Ge...
ICC
2008
IEEE
125views Communications» more  ICC 2008»
15 years 4 months ago
Real-Time, Byzantine-Tolerant Information Dissemination in Unreliable and Untrustworthy Distributed Systems
—In unreliable and untrustworthy systems, information dissemination may suffer network failures and attacks from Byzantine nodes which are controlled by traitors or adversaries, ...
Kai Han, Guanhong Pei, Binoy Ravindran, E. Douglas...
CCS
2010
ACM
14 years 8 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
IEEEIA
2009
14 years 7 months ago
Information Leakage Detection in Distributed Systems using Software Agent
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Current security mechanisms such as SELinux rely on tagging th...
Yung-Chuan Lee, Stephen Bishop, Hamed Okhravi, Sha...
ICASSP
2008
IEEE
15 years 4 months ago
System combination using auxiliary information for speaker verification
Recent studies in speaker recognition have shown that scorelevel combination of subsystems can yield significant performance gains over individual subsystems. We explore the use ...
Luciana Ferrer, Martin Graciarena, Argyrios Zymnis...