Sciweavers

469 search results - page 69 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
BVAI
2007
Springer
15 years 6 months ago
Non-invasive Brain-Actuated Interaction
The promise of Brain-Computer Interfaces (BCI) technology is to augment human capabilities by enabling interaction with computers through a conscious and spontaneous modulation of ...
José del R. Millán, Pierre W. Ferrez...
IFIP
1999
Springer
15 years 4 months ago
Management and optimization of multiple supply chains
Supply Chain Management (SCM) plans and controls the production over a group of autonomous enterprises. Process-oriented design is used to eliminate inefficiencies of the chain on...
J. Dorn
HASE
1997
IEEE
15 years 4 months ago
ReSoFT: A Reusable Testbed for Development and Evaluation of Software Fault-Tolerant Systems
The Reusable Software Fault Tolerance Testbed ReSoFT was developed to facilitate the development and evaluation of high-assurance systems that require tolerance of both hardware...
Kam S. Tso, Eltefaat Shokri, Roger J. Dziegiel Jr.
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 4 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
ALP
1992
Springer
15 years 3 months ago
Definitional Trees
Rewriting is a computational paradigm that specifies the actions, but not the control. We introduce a hierarchical structure repreat a high level of abstraction, a form of control....
Sergio Antoy