Sciweavers

294 search results - page 40 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
146
Voted
NDSS
2008
IEEE
15 years 10 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
114
Voted
ENTCS
2007
117views more  ENTCS 2007»
15 years 3 months ago
Relating Hybrid Chi to Other Formalisms
The hybrid χ (Chi) formalism is suited to modeling, simulation and verification of hybrid systems. It integrates concepts from dynamics and control theory with concepts from com...
D. A. van Beek, J. E. Rooda, Ramon R. H. Schiffele...
FLAIRS
2004
15 years 4 months ago
A Functional and Behavioral Knowledge-based Implementation for Intelligent Sensors/Actuators
As the complexity of industrial processes increases, it requires the use of intelligent sensors or actuators (known as Intelligent Instruments) to allow for more comprehensive and...
Richard Dapoigny, Patrick Barlatier, Laurent Foull...
IPPS
2003
IEEE
15 years 8 months ago
Multi-Paradigm Framework for Parallel Image Processing
A software framework for the parallel execution of sequential programs using C++ classes is presented. The functional language Concurrent ML is used to implement the underlying ha...
David J. Johnston, Martin Fleury, Andy C. Downton
153
Voted
WINET
2010
127views more  WINET 2010»
15 years 1 months ago
A Markov Decision Process based flow assignment framework for heterogeneous network access
We consider a scenario where devices with multiple networking capabilities access networks with heterogeneous characteristics. In such a setting, we address the problem of effici...
Jatinder Pal Singh, Tansu Alpcan, Piyush Agrawal, ...