Sciweavers

2269 search results - page 191 / 454
» Behavioral Intrusion Detection
Sort
View
142
Voted
ECBS
2000
IEEE
97views Hardware» more  ECBS 2000»
15 years 9 months ago
Ensuring Structure and Behavior Correctness in Design Composition
The design of a large component-based software system typically involves the composition of different components. Instead of relying on a free composition of components, we advoca...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan
165
Voted
AAAI
1996
15 years 6 months ago
Qualitative Multiple-Fault Diagnosis of Continuous Dynamic Systems Using Behavioral Modes
Most model-based diagnosis systems, such as GDE and Sherlock, have concerned discrete, static systems such as logic circuits and use simple constraint propagation to detect incons...
Siddarth Subramanian, Raymond J. Mooney
109
Voted
PERVASIVE
2006
Springer
15 years 5 months ago
The Diet-Aware Dining Table: Observing Dietary Behaviors over a Tabletop Surface
We are what we eat. Our everyday food choices affect our long-term and short-term health. In the traditional health care, professionals assess and weigh each individual's diet...
Keng-hao Chang, Shih-yen Liu, Hao-Hua Chu, Jane Yu...
IDEAL
2010
Springer
15 years 2 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
ACL
2011
14 years 8 months ago
Learning From Collective Human Behavior to Introduce Diversity in Lexical Choice
We analyze collective discourse, a collective human behavior in content generation, and show that it exhibits diversity, a property of general collective systems. Using extensive ...
Vahed Qazvinian, Dragomir R. Radev