Sciweavers

3565 search results - page 442 / 713
» Modeling a system controller for timing analysis
Sort
View
CODASPY
2012
14 years 21 days ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
DIMVA
2009
15 years 6 months ago
A Service Dependency Modeling Framework for Policy-Based Response Enforcement
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Nizar Kheir, Hervé Debar, Fréd&eacut...
143
Voted
JCM
2006
86views more  JCM 2006»
15 years 5 months ago
MAC Layer RFID Protocol for Low Cost Object Identification
In this paper, we introduce a novel medium access control (MAC) protocol for Radio Frequency Identification (RFID) systems. This protocol exploits the Markov Chain Model of Slotted...
Shweta Singh
IJVR
2008
140views more  IJVR 2008»
15 years 5 months ago
Modelling Autonomous Virtual Agent Behaviours in a Virtual Environment for Risk
Our research deals with the design of a training system to support decision-making in the preparation and the management of maintenance interventions in high-risk industries namely...
Lydie Edward, Domitile Lourdeaux, Jean-Paul A. Bar...
GW
2009
Springer
195views Biometrics» more  GW 2009»
15 years 2 months ago
Continuous Realtime Gesture Following and Recognition
Abstract. We present a HMM based system for real-time gesture analysis. The system outputs continuously parameters relative to the gesture time progression and its likelihood. Thes...
Frédéric Bevilacqua, Bruno Zamborlin...