Sciweavers

9732 search results - page 1787 / 1947
» Modelling Adaptivity with Aspects
Sort
View
HAIS
2010
Springer
15 years 9 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
KESAMSTA
2010
Springer
15 years 9 months ago
Symmetry Approach to Evacuation Scenarios
The first trial of using the symmetry analysis method in modeling of behavior of complex social system is presented in this work. The evacuation of large building scenarios are d...
Wieslawa Sikora, Janusz Malinowski
MOBILITY
2009
ACM
15 years 9 months ago
Context-sensitive authorization in interaction patterns
Main requirement of recent computing environments, like mobile and then ubiquitous computing, is to adapt applications to context. On the other hand, access control generally trus...
Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirot...
ROBOCUP
2009
Springer
289views Robotics» more  ROBOCUP 2009»
15 years 9 months ago
Real-Time Hand Gesture Recognition for Human Robot Interaction
In this article a hand gesture recognition system that allows interacting with a service robot, in dynamic environments and in real-time, is proposed. The system detects hands and ...
Mauricio Correa, Javier Ruiz-del-Solar, Rodrigo Ve...
ECAL
2001
Springer
15 years 9 months ago
The Shifting Network: Volume Signalling in Real and Robot Nervous Systems
This paper presents recent work in computational modelling of diffusing gaseous neuromodulators in biological nervous systems. It goes on to describe work in adaptive autonomous sy...
Phil Husbands, Andrew Philippides, Tom Smith, Mich...
« Prev « First page 1787 / 1947 Last » Next »