Sciweavers

959 search results - page 146 / 192
» Possible and Necessary h-Indices
Sort
View
RAID
1999
Springer
15 years 4 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 4 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
PADS
1997
ACM
15 years 4 months ago
The Dark Side of Risk (what your mother never told you about Time Warp)
This paper is a reminder of the danger of allowing \risk" when synchronizing a parallel discrete-event simulation: a simulation code that runs correctly on a serial machine m...
David M. Nicol, X. Liu
ICML
1989
IEEE
15 years 3 months ago
Uncertainty Based Selection of Learning Experiences
The training experiences needed by a learning system may be selected by either an external agent or the system itself. We show that knowledge of the current state of the learner&#...
Paul D. Scott, Shaul Markovitch
EPIA
2009
Springer
15 years 3 months ago
Obstacle Detection, Identification and Sharing on a Robotic Soccer Team
When building a representation of the environment for a robot in a multi-agent application, as is the case of robotic soccer, sensor and information fusion of several elements of t...
João Silva, Nuno Lau, António J. R. ...