Sciweavers

2874 search results - page 476 / 575
» Intrusion Detection: Systems and Models
Sort
View
ICASSP
2009
IEEE
15 years 6 months ago
Exploiting statically schedulable regions in dataflow programs
Dataflow descriptions have been used in a wide range of Digital Signal Processing (DSP) applications, such as multi-media processing, and wireless communications. Among various f...
Ruirui Gu, Jörn W. Janneck, Mickaël Raul...
OTM
2009
Springer
15 years 6 months ago
An Architecture for Dynamic Trust Monitoring in Mobile Networks
Collusion attacks remain a major problem of reputation and trust models, in mobile ad hoc networks. By covering up malicious behaviour of one another from the remaining part of the...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
ICRA
2008
IEEE
210views Robotics» more  ICRA 2008»
15 years 6 months ago
Toward designing a robot that learns actions from parental demonstrations
— How to teach actions to a robot as well as how a robot learns actions is an important issue to be discussed in designing robot learning systems. Inspired by human parentinfant ...
Yukie Nagai, Claudia Muhl, Katharina J. Rohlfing
ASWEC
2007
IEEE
15 years 3 months ago
Managing Conflicts When Using Combination Strategies to Test Software
Testers often represent systems under test in input parameter models. These contain parameters with associated values. Combinations of parameter values, with one value for each pa...
Mats Grindal, Jeff Offutt, Jonas Mellin
83
Voted
AAAI
2004
15 years 1 months ago
A Multi-Resolution Pyramid for Outdoor Robot Terrain Perception
This paper addresses the problem of outdoor terrain modeling for the purposes of mobile robot navigation. We propose an approach in which a robot acquires a set of terrain models ...
Michael Montemerlo, Sebastian Thrun