Sciweavers

707 search results - page 106 / 142
» Performance Modeling and Analysis of the Universal Control H...
Sort
View
RAID
2007
Springer
15 years 6 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
METRICS
2005
IEEE
15 years 5 months ago
Acceptance Issues in Metrics Program Implementation
Software process improvement initiatives such as metrics programs have a high failure rate during their assimilation in a software organization. Social and individual issues are s...
Medha Umarji, Henry Emurian
ENTCS
2007
98views more  ENTCS 2007»
14 years 11 months ago
Evaluating Complex MAC Protocols for Sensor Networks with APMC
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by con...
Michaël Cadilhac, Thomas Hérault, Rich...
JSW
2007
118views more  JSW 2007»
14 years 11 months ago
A New Formalism for Failure Diagnosis: Ant Colony Decision Petri Nets
— Failure diagnosis in large and complex systems is a critical task. A discrete event system (DES) approach to the problem of failure diagnosis is presented in this paper. A clas...
Calin Ciufudean, Adrian Graur, Constantin Filote, ...
MSWIM
2005
ACM
15 years 5 months ago
Using statistical design of experiments for analyzing mobile ad hoc networks
The performance of mobile ad hoc networks can be influenced by numerous factors, including protocol design at every layer; parameter settings such as retransmission limits and ti...
Michael W. Totaro, Dmitri D. Perkins