Sciweavers

4985 search results - page 207 / 997
» Observation of String-Rewriting Systems
Sort
View
166
Voted
IWIA
2006
IEEE
15 years 9 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
137
Voted
ATAL
2004
Springer
15 years 9 months ago
Analysis of a Stochastic Model of Adaptive Task Allocation in Robots
Adaptation is an essential requirement for self–organizing multi–agent systems functioning in unknown dynamic environments. Adaptation allows agents, e.g., robots, to change th...
Aram Galstyan, Kristina Lerman
CDC
2009
IEEE
142views Control Systems» more  CDC 2009»
15 years 8 months ago
Nonlinear attitude estimation using active vision and inertial measurements
Abstract— In this paper we consider the problem of estimating the attitude of a rigid body equipped with a triad of rate gyros and a pan and tilt camera. The nonlinear attitude o...
Sérgio Bras, Rita Cunha, José Fernan...
IPPS
1998
IEEE
15 years 8 months ago
Predicate Control for Active Debugging of Distributed Programs
Existing approaches to debugging distributed systems involve a cycle of passive observation followed by computation replaying. We propose predicate control as an active approach t...
Ashis Tarafdar, Vijay K. Garg
132
Voted
ESORICS
2004
Springer
15 years 7 months ago
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage
Abstract. We revisit the classical notion of noninterference for statebased systems, as presented by Rushby in 1992. We strengthen his results in several ways, in particular clarif...
David von Oheimb