Sciweavers

641 search results - page 44 / 129
» Performance and Effectiveness Analysis of Checkpointing in M...
Sort
View
ACSAC
2006
IEEE
15 years 8 months ago
Vulnerability Analysis of MMS User Agents
The Multimedia Messaging Service (MMS) is becoming more popular, as mobile phones integrate audio and video recording functionality. Multimedia messages are delivered to users thr...
Collin Mulliner, Giovanni Vigna
RAID
2005
Springer
15 years 7 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
ETFA
2008
IEEE
15 years 8 months ago
Shared control of a pan-tilt camera on an all-terrain mobile robot
Inspection of an environment is often limited to a single video feed, provenient from a camera assembled on a mobile robot. This is known as the keyhole effect. In addition to thi...
Carlos Cândido, Pedro Santana, Luís C...
ISER
2000
Springer
112views Robotics» more  ISER 2000»
15 years 5 months ago
Simulation and Experimental Evaluation of Complete Sensor-Based Coverage in Rectilinear Environments
: Although sensor-based coverage is a skill which is applicable to a variety of robot tasks, its implementation has so far been limited, mostly by the physical limitations of tradi...
Zack J. Butler, Alfred A. Rizzi, Ralph L. Hollis
117
Voted
ISER
1995
Springer
102views Robotics» more  ISER 1995»
15 years 5 months ago
Towards Principled Experimental Study of Autonomous Mobile Robots
We review the current state of research in autonomous mobile robots and conclude that there is an inadequate basis for predicting the reliability and behavior of robots operating ...
Erann Gat