Sciweavers

161 search results - page 22 / 33
» Design and Mathematical Analysis of Agent-Based Systems
Sort
View
91
Voted
IPPS
2006
IEEE
15 years 6 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
HYBRID
2003
Springer
15 years 5 months ago
Mode Reconstruction for Source Coding and Multi-modal Control
s of Invited Presentations The Mathematics of Matter and the Mathematics of Mind . . . . . . . . . . . . . 1 David Berlinski A Grand Challenge: Full Reactive Modeling of a Multi-ce...
Adam Austin, Magnus Egerstedt
ISSS
2002
IEEE
125views Hardware» more  ISSS 2002»
15 years 5 months ago
Security-Driven Exploration of Cryptography in DSP Cores
With the popularity of wireless communication devices a new important dimension of embedded systems design has arisen, that of security. This paper presents for the first time des...
Catherine H. Gebotys
125
Voted
JUCS
2000
102views more  JUCS 2000»
15 years 6 days ago
Towards Two-Level Formal Modeling of Computer-Based Systems
: Embedded Computer-based Systems are becoming highly complex and hard to implement because of the large number of concerns the designers have to address. These systems are tightly...
Gabor Karsai, Greg Nordstrom, Ákos Lé...
102
Voted
IPPS
2009
IEEE
15 years 7 months ago
Implementing and evaluating multithreaded triad census algorithms on the Cray XMT
Commonly represented as directed graphs, social networks depict relationships and behaviors among social entities such as people, groups, and organizations. Social network analysi...
George Chin Jr., Andrès Márquez, Sut...