Sciweavers

420 search results - page 43 / 84
» Modeling intrusion detection system using hybrid intelligent...
Sort
View
WSC
2007
15 years 2 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
IEEEPACT
2007
IEEE
15 years 6 months ago
JudoSTM: A Dynamic Binary-Rewriting Approach to Software Transactional Memory
With the advent of chip-multiprocessors, we are faced with the challenge of parallelizing performance-critical software. Transactional memory (TM) has emerged as a promising progr...
Marek Olszewski, Jeremy Cutler, J. Gregory Steffan
AIPS
2006
15 years 1 months ago
Knowledge-based Middleware as an Architecture for Planning and Scheduling Systems
We present an architecture that provides a robust, scalable and flexible software framework for planning and scheduling systems through the use of standardized industrial-strength...
Bernd Schattenberg, Steffen Balzer, Susanne Biundo
WSC
1998
15 years 1 months ago
Discrete-Event Simulation for the Design and Evaluation of Physical Protection Systems
This paper explores the use of discrete-event simulation for the design and control of physical protection systems for fixed-site facilities housing items of significant value. It...
Sabina E. Jordan, Mark K. Snell, Marcella M. Madse...
ICANN
2011
Springer
14 years 3 months ago
Person Tracking Based on a Hybrid Neural Probabilistic Model
This article presents a novel approach for a real-time person tracking system based on particle filters that use different visual streams. Due to the difficulty of detecting a pe...
Wenjie Yan, Cornelius Weber, Stefan Wermter