Sciweavers

1457 search results - page 91 / 292
» Privacy Challenges for Database Systems
Sort
View
138
Voted
SP
2008
IEEE
187views Security Privacy» more  SP 2008»
15 years 3 months ago
Efficient and Robust TCP Stream Normalization
Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an inl...
Mythili Vutukuru, Hari Balakrishnan, Vern Paxson
126
Voted
SPEECH
2010
208views more  SPEECH 2010»
14 years 10 months ago
Silent speech interfaces
The possibility of speech processing in the absence of an intelligible acoustic signal has given rise to the idea of a `silent speech' interface, to be used as an aid for the...
Bruce Denby, Thomas Schultz, Kiyoshi Honda, Thomas...
130
Voted
VLDB
2005
ACM
105views Database» more  VLDB 2005»
15 years 9 months ago
Light-weight Domain-based Form Assistant: Querying Web Databases On the Fly
The Web has been rapidly “deepened” by myriad searchable databases online, where data are hidden behind query forms. Helping users query alternative “deep Web” sources in ...
Zhen Zhang, Bin He, Kevin Chen-Chuan Chang
154
Voted
AGENTS
1999
Springer
15 years 7 months ago
On Being a Teammate: Experiences Acquired in the design of RoboCup Teams
Increasingly, multi-agent systems are being designed for a variety of complex, dynamic domains. E ective agent interactions in such domains raise some of most fundamental research...
Stacy Marsella, Jafar Adibi, Yaser Al-Onaizan, Gal...
133
Voted
SAFECOMP
1999
Springer
15 years 7 months ago
A Systematic Approach to Safety Case Maintenance
A crucial aspect of safety case management is the ongoing maintenance of the safety argument through life. Throughout the operational life of any system, the corresponding safety ...
Tim P. Kelly, John A. McDermid