Sciweavers

1791 search results - page 146 / 359
» Behavioral Operations
Sort
View
CONCUR
2007
Springer
15 years 10 months ago
Making Random Choices Invisible to the Scheduler
Abstract. When dealing with process calculi and automata which express both nondeterministic and probabilistic behavior, it is customary to introduce the notion of scheduler to res...
Konstantinos Chatzikokolakis, Catuscia Palamidessi
IEEEARES
2006
IEEE
15 years 10 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
IROS
2006
IEEE
168views Robotics» more  IROS 2006»
15 years 10 months ago
Learning to Drive Among Obstacles
— This paper reports on an outdoor mobile robot that learns to avoid collisions by observing a human driver operate a vehicle equipped with sensors that continuously produce a ma...
Bradley Hamner, Sebastian Scherer, Sanjiv Singh
WOWMOM
2006
ACM
111views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
An Experimental Testbed and Methodology for Characterizing IEEE 802.11 Network Cards
— It has been observed that IEEE 802.11 commercial cards produced by different vendors show a different behavior in terms of perceived throughput or access delay. Performance dif...
Antonio Di Stefano, Giovanni Terrazzino, Luca Scal...
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
15 years 10 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif