Sciweavers

1587 search results - page 186 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
104
Voted
AGENTS
1999
Springer
15 years 2 months ago
General Principles of Learning-Based Multi-Agent Systems
We consider the problem of how to design large decentralized multiagent systems (MAS’s) in an automated fashion, with little or no hand-tuning. Our approach has each agent run a...
David Wolpert, Kevin R. Wheeler, Kagan Tumer
ICAPR
2005
Springer
15 years 3 months ago
Millimetre-Wave Personnel Scanners for Automated Weapon Detection
The ATRIUM project aims to the automatic detection of threats hidden under clothes using millimetre-wave imaging. We describe a simulator of realistic millimetre-wave images and a...
Beatriz Grafulla-González, Christopher D. H...
ICMI
2009
Springer
132views Biometrics» more  ICMI 2009»
15 years 4 months ago
Activity-aware ECG-based patient authentication for remote health monitoring
Mobile medical sensors promise to provide an efficient, accurate, and economic way to monitor patients’ health outside the hospital. Patient authentication is a necessary secur...
Janani C. Sriram, Minho Shin, Tanzeem Choudhury, D...
CCS
2010
ACM
14 years 10 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
99
Voted
CIARP
2003
Springer
15 years 3 months ago
Online Handwritten Signature Verification Using Hidden Markov Models
Most people are used to signing documents and because of this, it is a trusted and natural method for user identity verification, reducing the cost of password maintenance and decr...
Juan J. Igarza, Iñaki Goirizelaia, Koldo Es...