Sciweavers

294 search results - page 31 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
124
Voted
IMAGING
2003
15 years 4 months ago
Reproducing 3D Prints on Monitor by Relative-Glossiness Matching Technique
For over 3 decades, computer graphics technology has been developed to simulate physically accurate image of real scene. Meanwhile, useful tone mapping methods have been developed...
Toru Ishi, Norimichi Tsumura, Masami Shishikura, Y...
154
Voted
CAINE
2004
15 years 5 months ago
A PID Controller for Real-Time DC Motor Speed Control using the C505C Microcontroller
This paper presents a real-time DC Motor speed controller design using a microcontroller-based network system. The design architecture was developed using two Phytec evaluation bo...
Sukumar Kamalasadan, Abhiman Hande
SIGMOD
2005
ACM
151views Database» more  SIGMOD 2005»
16 years 3 months ago
The 8 requirements of real-time stream processing
Applications that require real-time processing of high-volume data steams are pushing the limits of traditional data processing infrastructures. These stream-based applications in...
Michael Stonebraker, Ugur Çetintemel, Stanley B. ...
AIM
2002
15 years 3 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
160
Voted
ASIAMS
2008
IEEE
15 years 10 months ago
HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment
Our previous research illustrated the design of fuzzy logic based online risk assessment for Distributed Intrusion Prediction and Prevention Systems (DIPPS) [3]. Based on the DIPP...
Kjetil Haslum, Ajith Abraham, Svein J. Knapskog