Sciweavers

9387 search results - page 1596 / 1878
» An Optimal Process Model for a Real Time Process
Sort
View
119
Voted
STOC
2003
ACM
99views Algorithms» more  STOC 2003»
16 years 5 months ago
On the fractal behavior of TCP
We propose a natural, mathematically tractable model of TCP which captures both its additive-increase, multiplicative-decrease behavior and its feedback mechanism. Neither a fluid...
Anna C. Gilbert, Howard J. Karloff
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 11 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
ATAL
2007
Springer
15 years 11 months ago
Towards collaborative task and team maintenance
There is significant interest in modeling teamwork in agents. In recent years, it has become widely accepted that it is possible to separate teamwork from taskwork, providing sup...
Gal A. Kaminka, Ari Yakir, Dan Erusalimchik, Nirom...
ISMIS
2005
Springer
15 years 10 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
ISSADS
2005
Springer
15 years 10 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...
« Prev « First page 1596 / 1878 Last » Next »