Sciweavers

343 search results - page 22 / 69
» Normal State Implicature
Sort
View
IWCMC
2006
ACM
15 years 3 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
69
Voted
ACSD
2005
IEEE
126views Hardware» more  ACSD 2005»
15 years 3 months ago
Modelling and Analysis of Distributed Simulation Protocols with Distributed Graph Transformation
This paper presents our approach to model distributed discrete event simulation systems in the framework of distributed graph transformation. We use distributed typed attributed g...
Juan de Lara, Gabriele Taentzer
HPCA
2011
IEEE
14 years 1 months ago
Architectural framework for supporting operating system survivability
The ever increasing size and complexity of Operating System (OS) kernel code bring an inevitable increase in the number of security vulnerabilities that can be exploited by attack...
Xiaowei Jiang, Yan Solihin
ICRA
2006
IEEE
93views Robotics» more  ICRA 2006»
15 years 3 months ago
Dynamic Features and Prediction Model for Imaging the Fingernail to Measure Fingertip Forces
— As an extension of our previous work on estimating fingertip forces by imaging the fingernail [13], the dynamic features of the coloration response of different parts of the ...
Yu Sun, John M. Hollerbach, Stephen A. Mascaro
54
Voted
HICSS
1996
IEEE
75views Biometrics» more  HICSS 1996»
15 years 1 months ago
Geographic Variation in Internet Connectivity
This paper presents a measure of Internet "connectivity" (number of connected companies per capita) normalized by the economic "size" of areas in the United St...
Luke M. Froeb, Richard W. Oliver, David A. Weiskop...