Sciweavers

452 search results - page 35 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
ICRA
2006
IEEE
99views Robotics» more  ICRA 2006»
15 years 3 months ago
Application of Set Membership Identification for Fault Detection of MEMS
- In this article, a set membership (SM) identification technique is tailored to detect faults in microelectromechanical systems. The SM-identifier estimates an orthotope which con...
Vasso Reppa, Anthony Tzes
ICDE
2006
IEEE
104views Database» more  ICDE 2006»
15 years 3 months ago
Trusted CVS
The CVS (Concurrent Versions System) software is a popular method for recording modifications to data objects, in addition to concurrent access to data in a multi-user environmen...
Muthuramakrishnan Venkitasubramaniam, Ashwin Macha...
HCI
2007
14 years 11 months ago
Unobtrusive Multimodal Emotion Detection in Adaptive Interfaces: Speech and Facial Expressions
Two unobtrusive modalities for automatic emotion recognition are discussed: speech and facial expressions. First, an overview is given of emotion recognition studies based on a com...
Khiet P. Truong, David A. van Leeuwen, Mark A. Nee...
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 4 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
CEEMAS
2007
Springer
15 years 3 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...