Sciweavers

655 search results - page 89 / 131
» A behavioral approach to worm detection
Sort
View
78
Voted
ASPDAC
2004
ACM
94views Hardware» more  ASPDAC 2004»
15 years 1 months ago
Improving simulation-based verification by means of formal methods
The design of complex systems is largely ruled by the time needed for verification. Even though formal methods can provide higher reliability, in practice often simulation based ve...
Görschwin Fey, Rolf Drechsler
NIPS
2007
14 years 11 months ago
Congruence between model and human attention reveals unique signatures of critical visual events
Current computational models of bottom-up and top-down components of attention are predictive of eye movements across a range of stimuli and of simple, fixed visual tasks (such a...
Robert J. Peters, Laurent Itti
ATAL
2009
Springer
15 years 4 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
BPM
2010
Springer
163views Business» more  BPM 2010»
14 years 10 months ago
Self-adjusting Recommendations for People-Driven Ad-Hoc Processes
Abstract. A company's ability to flexibly adapt to changing business requirements is one key factor to remain competitive. The required flexibility in peopledriven processes i...
Christoph Dorn, Thomas Burkhart, Dirk Werth, Schah...
CLEIEJ
2006
126views more  CLEIEJ 2006»
14 years 9 months ago
Software Based Fault Tolerance against Byzantine Failures
The proposed software technique is a very low cost and an effective solution towards designing Byzantine fault tolerant computing application systems that are not so safety critic...
Goutam Kumar Saha