Sciweavers

2746 search results - page 453 / 550
» Case Study in Survivable Network System Analysis
Sort
View
IPPS
2010
IEEE
14 years 11 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
IWPC
2006
IEEE
15 years 7 months ago
Classifying Change Types for Qualifying Change Couplings
Current change history analysis approaches rely on information provided by versioning systems such as CVS. Therefore, changes are not related to particular source code entities su...
Beat Fluri, Harald Gall
117
Voted
ESEM
2007
ACM
15 years 3 months ago
Assessing, Comparing, and Combining Statechart- based testing and Structural testing: An Experiment
An important number of studies have addressed the importance of models in software engineering, mainly in the design of robust software systems. Although models have been proven t...
Samar Mouchawrab, Lionel C. Briand, Yvan Labiche
NECO
2006
98views more  NECO 2006»
15 years 1 months ago
Comment on "Characterization of Subthreshold Voltage Fluctuations in Neuronal Membranes, " by M. Rudolph and A. Destexhe
In two recent papers, Rudolph and Destexhe (Neural Comp. 15, 2577-2618, 2003; Neural Comp. in press, 2005) studied a leaky integrator model (i.e. an RC-circuit) driven by correlat...
Benjamin Lindner, André Longtin
VIROLOGY
2008
121views more  VIROLOGY 2008»
15 years 1 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...