Sciweavers

558 search results - page 18 / 112
» Safe and Effective Determinant Evaluation
Sort
View
ACSAC
2002
IEEE
15 years 4 months ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
ADC
2008
Springer
114views Database» more  ADC 2008»
15 years 1 months ago
An Integrated Access Control for Securely Querying and Updating XML Data
Many existing access controls use node filtering or querying rewriting techniques. These techniques require rather time-consuming processes such as parsing, labeling, pruning and/...
Maggie Duong, Yanchun Zhang
ICPADS
2007
IEEE
15 years 6 months ago
S/Kademlia: A practicable approach towards secure key-based routing
Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Ingmar Baumgart, Sebastian Mies
IROS
2007
IEEE
157views Robotics» more  IROS 2007»
15 years 6 months ago
Coordination of multiple vehicles for area coverage tasks
— Area coverage operations such as plowing a field or mowing a lawn can be performed faster if multiple vehicles are involved. To use a team of automated vehicles safely and eff...
Garrett Dean Winward, Nicholas S. Flann
ICMCS
2007
IEEE
144views Multimedia» more  ICMCS 2007»
15 years 6 months ago
Analysis, User Interface, and their Evaluation for Student Presentation Videos
In the domain of candidly-captured student presentation videos, we examine and evaluate approaches for multimodal analysis and indexing of audio and video. We apply visual segment...
Alexander Haubold, John R. Kender