Sciweavers

78 search results - page 11 / 16
» Analyzing critical process models through behavior model syn...
Sort
View
TWC
2008
125views more  TWC 2008»
14 years 9 months ago
Packet level performance analysis in wireless user-relaying networks
In this paper, the impact of user relaying on the behavior of a relay node, which acts as the source node at the same time, is analyzed in a wireless relay network at the packet le...
Jun Cai, Attahiru Sule Alfa, Pinyi Ren, Xuemin She...
IAT
2008
IEEE
15 years 3 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
ROBOCOMM
2007
IEEE
15 years 3 months ago
Shared memories: a trail-based coordination server for robot teams
Abstract—Robust, dependable and concise coordination between members of a robot team is a critical ingredient of any such collective activity. Depending on the availability and t...
George Roussos, Dikaios Papadogkonas, J. Taylor, D...
CIA
2008
Springer
14 years 11 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
SCHOLARPEDIA
2010
80views more  SCHOLARPEDIA 2010»
14 years 7 months ago
Working memory
—Studies of attention and working memory address the fundamental limits in our ability to encode and maintain behaviorally relevant information, processes that are critical for g...
Alan Baddeley