Sciweavers

1353 search results - page 196 / 271
» Securing Current and Future Process Control Systems
Sort
View
KI
2010
Springer
15 years 2 months ago
CoTeSys - Cognition for Technical Systems
The COTESYS cluster of excellence1 investigates cognition for technical systems such as vehicles, robots, and factories. Cognitive technical systems (CTS) are information processi...
Martin Buss, Michael Beetz
CCS
2009
ACM
15 years 10 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
FGR
1996
IEEE
159views Biometrics» more  FGR 1996»
15 years 8 months ago
Visual Interaction With Lifelike Characters
This paper explores the use of fast, simple computer vision techniques to add compelling visual capabilities to social user interfaces. Social interfaces involve the user in natur...
Matthew Turk
ACSAC
2000
IEEE
15 years 8 months ago
Layering Boundary Protections: An Experiment in Information Assurance
The DARPA Information Assurance Program has the aim of developing and executing experiments that test specific hypotheses about defense in depth and dynamic defense capabilities. ...
D. Johnson, L. Benzinger
AGENTS
1997
Springer
15 years 8 months ago
Integrating Communicative Action, Conversations and Decision Theory to Coordinate Agents
The coordination problem in multi-agent systems is the problem of managing dependencies between the activities of autonomous agents, in conditions of incomplete knowledge about th...
Mihai Barbuceanu, Mark S. Fox