Sciweavers

38 search results - page 6 / 8
» Introducing the TekiControl project: Using ROS from C
Sort
View
MOBIHOC
2007
ACM
15 years 9 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
CASES
2004
ACM
15 years 3 months ago
Balancing design options with Sherpa
Application specific processors offer the potential of rapidly designed logic specifically constructed to meet the performance and area demands of the task at hand. Recently, t...
Timothy Sherwood, Mark Oskin, Brad Calder
SIGCOMM
2009
ACM
15 years 4 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
DISCEX
2003
IEEE
15 years 3 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes
BMCBI
2008
100views more  BMCBI 2008»
14 years 10 months ago
PatternLab for proteomics: a tool for differential shotgun proteomics
Background: A goal of proteomics is to distinguish between states of a biological system by identifying protein expression differences. Liu et al. demonstrated a method to perform...
Paulo C. Carvalho, Juliana S. G. Fischer, Emily I....