Sciweavers

2209 search results - page 185 / 442
» Language Based Secure Communication
Sort
View
AGENTS
2000
Springer
15 years 8 months ago
Unsupervised clustering of robot activities: a Bayesian approach
Our goal is for robots to learn conceptual systems su cient for natural language and planning. The learning should be autonomous, without supervision. The rst steps in building a ...
Marco Ramoni, Paola Sebastiani, Paul R. Cohen
ICC
2009
IEEE
162views Communications» more  ICC 2009»
15 years 11 months ago
CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding
—The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security con...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
CCS
2009
ACM
15 years 11 months ago
Proximity-based access control for implantable medical devices
We propose a proximity-based access control scheme for implantable medical devices (IMDs). Our scheme is based on ultrasonic distancebounding and enables an implanted medical devi...
Kasper Bonne Rasmussen, Claude Castelluccia, Thoma...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 10 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
UM
2001
Springer
15 years 9 months ago
Perceptual Considerations for Quality of Service Management: An Integrated Architecture
In this paper, we suggest an integrated architecture that makes use of the objective-technical information provided by the designer and the subjectiveperceptual information supplie...
George Ghinea, George D. Magoulas