Sciweavers

51 search results - page 10 / 11
» Isolating Intrusions by Automatic Experiments
Sort
View
GECCO
2005
Springer
195views Optimization» more  GECCO 2005»
13 years 11 months ago
Evolving fuzzy decision tree structure that adapts in real-time
A fuzzy logic algorithm has been developed that automatically allocates electronic attack (EA) resources distributed over different platforms in real-time. The controller must be ...
James F. Smith III
ICC
2007
IEEE
156views Communications» more  ICC 2007»
14 years 17 days ago
CA-AQM: Channel-Aware Active Queue Management for Wireless Networks
—In a wireless network, data transmission suffers from varied signal strengths and channel bit error rates. To ensure successful packet reception under different channel conditio...
Yuan Xue, Hoang Nguyen, Klara Nahrstedt
SIGSOFT
2003
ACM
14 years 7 months ago
Deadline analysis of interrupt-driven software
Real-time, reactive, and embedded systems are increasingly used throughout society (e.g., flight control, railway signaling, vehicle management, medical devices, and many others)....
Dennis Brylow, Jens Palsberg
KBSE
2007
IEEE
14 years 16 days ago
Context-aware statistical debugging: from bug predictors to faulty control flow paths
Effective bug localization is important for realizing automated debugging. One attractive approach is to apply statistical techniques on a collection of evaluation profiles of pr...
Lingxiao Jiang, Zhendong Su
NAACL
2003
13 years 7 months ago
Comma Restoration Using Constituency Information
Automatic restoration of punctuation from unpunctuated text has application in improving the fluency and applicability of speech recognition systems. We explore the possibility t...
Stuart M. Shieber, Xiaopeng Tao