Sciweavers

1120 search results - page 58 / 224
» Eager Markov Chains
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
15 years 9 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
ANSS
2005
IEEE
15 years 5 months ago
Approximation of Discrete Phase-Type Distributions
The analysis of discrete stochastic models such as generally distributed stochastic Petri nets can be done using state space-based methods. The behavior of the model is described ...
Claudia Isensee, Graham Horton
QEST
2005
IEEE
15 years 5 months ago
Comparative Analysis of Bisimulation Relations on Alternating and Non-Alternating Probabilistic Models
We consider bisimulation and weak bisimulation relations in the context of the Labeled Markov Chains of Hansson and Jonsson, the Concurrent Labeled Markov Chains of Philippou, Lee...
Roberto Segala, Andrea Turrini
FSTTCS
2004
Springer
15 years 5 months ago
Verifying Probabilistic Procedural Programs
Abstract. Monolithic finite-state probabilistic programs have been abstractly modeled by finite Markov chains, and the algorithmic verification problems for them have been inves...
Javier Esparza, Kousha Etessami
INFOCOM
2002
IEEE
15 years 4 months ago
Exact sampling of TCP Window States
We demonstrate how to apply Coupling from the Past, a simulation technique for exact sampling, to Markov chains based on TCP variants. This approach provides a new, statistically ...
Ashish Goel, Michael Mitzenmacher