Sciweavers

1345 search results - page 66 / 269
» Reliable dissolve detection
Sort
View
CCS
2004
ACM
15 years 3 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
REFSQ
2010
Springer
14 years 8 months ago
Ambiguity Detection: Towards a Tool Explaining Ambiguity Sources
Abstract. [Context and motivation] Natural language is the main representation means of industrial requirements documents, which implies that requirements documents are inherently ...
Benedikt Gleich, Oliver Creighton, Leonid Kof
ICOST
2009
Springer
15 years 4 months ago
Pervasive Informatics and Persistent Actimetric Information in Health Smart Homes
This paper discuss the ability to obtain a reliable pervasive information at home from a network of localizing sensors allowing to follow the different locations at which a depend...
Yannick Fouquet, Nicolas Vuillerme, Jacques Demong...
ICASSP
2008
IEEE
15 years 4 months ago
Power control in spectrum overlay networks: How to cross a multi-lane highway
—We consider power control in spectrum overlay networks (also referred to as opportunistic spectrum access) where secondary users identify and exploit instantaneous and local spe...
Wei Ren, Qing Zhao, Ashwin Swami
HASE
2007
IEEE
15 years 4 months ago
A Nonparametric Cusum Algorithm for Timeslot Sequences with Applications to Network Surveillance
We adapt the classic cusum change-point detection algorithm for applications to data network monitoring where various and numerous performance and reliability metrics are availabl...
Qi Zhang, Carlos Rendón, Veronica Montes De...