Sciweavers

851 search results - page 73 / 171
» Synthesis of Distributed Systems from Knowledge-Based Specif...
Sort
View
134
Voted
WORM
2004
15 years 4 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 6 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
94
Voted
JOCN
2010
129views more  JOCN 2010»
15 years 1 months ago
Arabic Morphology in the Neural Language System
■ There are two views about morphology, the aspect of language concerned with the internal structure of words. One view holds that morphology is a domain of knowledge with a spe...
Sami Boudelaa, Friedemann Pulvermüller, Olaf ...
HICSS
2000
IEEE
133views Biometrics» more  HICSS 2000»
15 years 7 months ago
Research, Development, and Demonstration Needs for Large-Scale, Reliability-Enhancing, Integration of Distributed Energy Resourc
Distributed energy resources (DER) are in transition from the lab to the marketplace. The defining characteristic of DER is that they are active devices installed at the distribut...
Joseph Eto, Vikram Budhraja, Carlos Martinez, Jim ...
HASE
1997
IEEE
15 years 7 months ago
Automated Computation of Decomposable Synchronization Conditions
: The most important aspect of concurrent and distributed computation is the interaction between system components. Integration of components into a system requires some synchroniz...
Gilberto Matos, James M. Purtilo, Elizabeth L. Whi...