Sciweavers

8177 search results - page 264 / 1636
» Detecting System Emulators
Sort
View
PODC
2005
ACM
15 years 8 months ago
Stochastic analysis of distributed deadlock scheduling
Deadlock detection scheduling is an important, yet oft-overlooked problem that can significantly affect the overall performance of deadlock handling. An excessive initiation of ...
Shigang Chen, Yibei Ling
JAIR
2010
181views more  JAIR 2010»
14 years 10 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
CAMP
2005
IEEE
15 years 8 months ago
Automatic Parameter Regulation for a Tracking System with an Auto-Critical Function
Abstract— In this article we propose an architecture of a tracking system that can judge its own performance by an auto-critical function. Performance drops can be detected which...
Daniela Hall
USS
2008
15 years 5 months ago
Research Challenges for the Security of Control Systems
In this paper we attempt to answer two questions: (1) Why should we be interested in the security of control systems? And (2) What are the new and fundamentally different requirem...
Alvaro A. Cárdenas, Saurabh Amin, Shankar S...
ICFEM
2003
Springer
15 years 8 months ago
Service-Based Systems Engineering: Consistent Combination of Services
Using service-based system descriptions simplifies the specification of complex reactive systems as found in the domain of web-services as well as embedded systems. To support a se...
Bernhard Schätz, Chris Salzmann