Sciweavers

655 search results - page 40 / 131
» A behavioral approach to worm detection
Sort
View
CDC
2010
IEEE
127views Control Systems» more  CDC 2010»
14 years 4 months ago
The wireless control network: Monitoring for malicious behavior
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...
CAI
2010
Springer
14 years 7 months ago
SMA - The Smyle Modeling Approach
Abstract. This paper introduces the model-based software development lifecycle model SMA--the Smyle Modeling Approach--which is centered around Smyle. Smyle is a dedicated learning...
Benedikt Bollig, Joost-Pieter Katoen, Carsten Kern...
ECCV
2010
Springer
15 years 2 months ago
Modeling and Analysis of Dynamic Behaviors of Web Image Collections
Abstract. Can we model the temporal evolution of topics in Web image collections? If so, can we exploit the understanding of dynamics to solve novel visual problems or improve reco...
CODES
2009
IEEE
15 years 4 months ago
A variation-tolerant scheduler for better than worst-case behavioral synthesis
– There has been a recent shift in design paradigms, with many turning towards yield-driven approaches to synthesize and design systems. A major cause of this shift is the contin...
Jason Cong, Albert Liu, Bin Liu
92
Voted
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
14 years 11 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...