Sciweavers

2357 search results - page 93 / 472
» Computing Refactorings of Behavior Models
Sort
View
DSOM
2009
Springer
15 years 4 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...
TOG
2002
133views more  TOG 2002»
14 years 9 months ago
Structural modeling of flames for a production environment
In this paper we describe a system for animating flames. Stochastic models of flickering and buoyant diffusion provide realistic local appearance while physics-based wind fields a...
Arnauld Lamorlette, Nick Foster
PARA
2004
Springer
15 years 3 months ago
Performance of Taylor Model Methods for Validated Integration of ODEs
The performance of various Taylor model (TM)-based methods for the validated integration of ODEs is studied for some representative computational problems. For nonlinear problems, ...
Martin Berz, Kyoko Makino
ICDCS
2008
IEEE
15 years 4 months ago
Enabling Accurate Node Control in Randomized Duty Cycling Networks
— In this paper, we propose a novel duty cycling algorithm for large-scale dense wireless sensor networks. The proposed algorithm is based on a social behavior of nodes in the se...
Kang-Won Lee, Vasileios Pappas, Asser N. Tantawi
ICPR
2010
IEEE
14 years 8 months ago
Online Learning with Self-Organizing Maps for Anomaly Detection in Crowd Scenes
Detecting abnormal behaviors in crowd scenes is quite important for public security and has been paid more and more attentions. Most previous methods use offline trained model to p...
Jie Feng, Chao Zhang, Pengwei Hao