Sciweavers

981 search results - page 163 / 197
» Semantics-aware trace analysis
Sort
View
ENTCS
2006
160views more  ENTCS 2006»
15 years 1 months ago
Checking and Correcting Behaviors of Java Programs at Runtime with Java-MOP
Monitoring-oriented programming (MOP) is a software development and analysis technique in which monitoring plays a fundamental role. MOP users can add their favorite or domain-spe...
Feng Chen, Marcelo d'Amorim, Grigore Rosu
IJNSEC
2008
137views more  IJNSEC 2008»
15 years 1 months ago
Baseline Profile Stability for Network Anomaly Detection
Network attacks are commonplace in the Internet. One of the defense mechanisms against the network attacks is using a baseline profile established during normal operation to detec...
Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh
JMLR
2008
141views more  JMLR 2008»
15 years 1 months ago
A New Algorithm for Estimating the Effective Dimension-Reduction Subspace
The statistical problem of estimating the effective dimension-reduction (EDR) subspace in the multi-index regression model with deterministic design and additive noise is consider...
Arnak S. Dalalyan, Anatoly Juditsky, Vladimir Spok...
91
Voted
JNCA
2008
117views more  JNCA 2008»
15 years 1 months ago
Assessing readiness of IP networks to support desktop videoconferencing using OPNET
OPNET is a powerful network design and simulation tool that has gained popularity in industry and academia. However, there exists no known simulation approach on how to deploy a p...
Khaled Salah, Prasad Calyam, M. I. Buhari
TCOM
2008
131views more  TCOM 2008»
15 years 1 months ago
Accurate estimation of the Hurst parameter of long-range dependent traffic using modified Allan and Hadamard variances
Abstract--Internet traffic exhibits self-similarity and longrange dependence (LRD) on various time scales. In this paper, we propose to use the Modified Allan Variance (MAVAR) and ...
Stefano Bregni, Luca Jmoda