Sciweavers

2269 search results - page 335 / 454
» Behavioral Intrusion Detection
Sort
View
ICALT
2008
IEEE
15 years 11 months ago
The Virtual Conductor: Learning and Teaching about Music, Performing, and Conducting
The Virtual Conductor is an artificial conducting system that uses real-time audio analysis of music played by musicians and uses this analysis to animate a virtual human that act...
Anton Nijholt, Dennis Reidsma, Rob Ebbers, Mark te...
127
Voted
ICCCN
2007
IEEE
15 years 11 months ago
Attack Containment Framework for Large-Scale Critical Infrastructures
— We present an attack containment framework against value-changing attacks in large-scale critical infrastructures, based on early warning and cooperative response approaches. W...
Hoang Nguyen, Klara Nahrstedt
102
Voted
CAV
2007
Springer
118views Hardware» more  CAV 2007»
15 years 10 months ago
C32SAT: Checking C Expressions
C32SAT is a tool for checking C expressions. It can check whether a given C expression can be satisfied, is tautological, or always defined according to the ISO C99 standard. C32...
Robert Brummayer, Armin Biere
107
Voted
ISCAS
2006
IEEE
93views Hardware» more  ISCAS 2006»
15 years 10 months ago
Discontinuity-induced bifurcations in TCP/RED communication algorithms
— In this paper, we describe a simple second-order discrete-time model for the Transmission Control Protocol (TCP) with Random Early Detection (RED) algorithm. The TCP/RED mechan...
Mingjian Liu, A. Marciello, Mario di Bernardo, Lji...
FATES
2004
Springer
15 years 10 months ago
A Test Generation Framework for quiescent Real-Time Systems
We present an extension of Tretmans’ theory and algorithm for test generation for input-output transition systems to real-time systems. Our treatment is based on an operational i...
Laura Brandán Briones, Ed Brinksma