Sciweavers

10910 search results - page 213 / 2182
» Input modeling using a computer algebra system
Sort
View
ISMIS
2005
Springer
15 years 9 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
RTSS
2003
IEEE
15 years 9 months ago
Timed I/O Automata: A Mathematical Framework for Modeling and Analyzing Real-Time Systems
We describe the Timed Input/Output Automata (TIOA) framework, a general mathematical framework for modeling and analyzing real-time systems. It is based on timed I/O automata, whi...
Dilsun Kirli Kaynar, Nancy A. Lynch, Roberto Segal...
DAC
2008
ACM
16 years 5 months ago
Partial order reduction for scalable testing of systemC TLM designs
A SystemC simulation kernel consists of a deterministic implementation of the scheduler, whose specification is nondeterministic. To leverage testing of a SystemC TLM design, we f...
Sudipta Kundu, Malay K. Ganai, Rajesh Gupta
SIMULATION
2002
118views more  SIMULATION 2002»
15 years 3 months ago
Simulation of Tactical Communications Systems by Inferring Detailed Data from the Joint Theater-Level Computer-Aided Exercises
- In this paper, a new scheme for the simulation of tactical communications systems is introduced where the mobility, call and availability patterns for the communications equipmen...
Erdal Cayirci, Cem Ersoy
CVPR
1997
IEEE
16 years 6 months ago
Global Training of Document Processing Systems Using Graph Transformer Networks
We propose a new machine learning paradigm called Graph Transformer Networks that extends the applicability of gradient-based learning algorithms to systems composed of modules th...
Léon Bottou, Yoshua Bengio, Yann LeCun