Sciweavers

1791 search results - page 123 / 359
» Behavioral Operations
Sort
View
117
Voted
VTC
2010
IEEE
128views Communications» more  VTC 2010»
15 years 3 months ago
Performance of Underwater Ad-Hoc Networks
Abstract— We consider the performance of underwater acoustic ad-hoc networks. We assume a uniform distribution of the nodes over a finite area. The node-to-node channel is model...
Andrej Stefanov, Milica Stojanovic
186
Voted
WCRE
2010
IEEE
15 years 3 months ago
Extracting Sequence Diagrams from Execution Traces Using Interactive Visualization
—We present a semi-automated approach for the reverse engineering of UML sequence diagrams. Our approach starts with a set of execution traces that are automatically aligned in o...
Hassen Grati, Houari A. Sahraoui, Pierre Poulin
COCOON
2009
Springer
15 years 11 months ago
On the Performances of Nash Equilibria in Isolation Games
: Network games play a fundamental role in understanding behavior in many domains, ranging from communication networks through markets to social networks. Such networks are used, a...
Vittorio Bilò, Michele Flammini, Gianpiero ...
RAID
2009
Springer
15 years 11 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
CASES
2005
ACM
15 years 6 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...