Sciweavers

947 search results - page 48 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
IEEEIAS
2009
IEEE
15 years 8 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
AFRIGRAPH
2003
ACM
15 years 6 months ago
Psychophysically based artistic techniques for increased perceived realism of virtual environments
The perceived realism of a computer generated image depends on the accuracy of the modeling and illumination calculations, the limitations of the display device, and the way in wh...
Peter Longhurst, Patrick Ledda, Alan Chalmers
IFM
2010
Springer
190views Formal Methods» more  IFM 2010»
14 years 12 months ago
On Model Checking Techniques for Randomized Distributed Systems
Abstract. The automata-based model checking approach for randomized distributed systems relies on an operational interleaving semantics of the system by means of a Markov decision ...
Christel Baier
WOSP
2000
ACM
15 years 5 months ago
Visual representation of stochastic process algebra models
Performance models are of increasing interest to professionals who do not have a background in mathematical analysis, it is important to provide additional mechanisms by developer...
Nigel Thomas, Malcolm Munro, Peter J. B. King, Rob...
COOP
2004
15 years 2 months ago
Model Checking Groupware Protocols
Abstract. The enormous improvements in the efficiency of model-checking techniques in recent years facilitates their application to ever more complex systems of concurrent and dist...
Maurice H. ter Beek, Mieke Massink, Diego Latella,...