Sciweavers

186 search results - page 19 / 38
» Operational Characteristics of an Automated Intrusion Respon...
Sort
View
131
Voted
GECCO
2008
Springer
180views Optimization» more  GECCO 2008»
15 years 2 months ago
Bond-graphs + genetic programming: analysis of an automatically synthesized rotary mechanical system
Initial results of an experiment devised to combine Bond-Graph modeling and simulation with genetic programming for automated design of a simple mechatronic system are reported in...
Saheeb Ahmed Kayani, Muhammad Afzaal Malik
RTAS
2008
IEEE
15 years 8 months ago
Throttling On-Disk Schedulers to Meet Soft-Real-Time Requirements
To achieve better throughput, many hard drive manufacturers use internal queues and scheduling to take advantage of vendor-specific characteristics and knowledge. While this tren...
Mark J. Stanovich, Theodore P. Baker, An-I Andy Wa...
SIMUTOOLS
2008
15 years 3 months ago
Transforming sources to petri nets: a way to analyze execution of parallel programs
Model checking is a suitable formal technique to analyze parallel programs' execution in an industrial context because automated tools can be designed and operated with very ...
Jean-Baptiste Voron, Fabrice Kordon
158
Voted
SIMPAR
2010
386views Robotics» more  SIMPAR 2010»
15 years 7 days ago
Virtual Robot Experimentation Platform V-REP: A Versatile 3D Robot Simulator
From exploring planets to cleaning homes, the reach and versatility of robotics is vast. The integration of actuation, sensing and control makes robotics systems powerful, but comp...
Marc Freese, Surya P. N. Singh, Fumio Ozaki, Nobut...
LISA
2004
15 years 3 months ago
Real-time Log File Analysis Using the Simple Event Correlator (SEC)
Originally published at Usenix LISA 2004 conference. November 2004 Atlanta, Georiga, USA. Log analysis is an important way to keep track of computers and networks. The use of auto...
John P. Rouillard