Sciweavers

1554 search results - page 261 / 311
» Testing Polymorphic Behavior
Sort
View
TSMC
2008
172views more  TSMC 2008»
15 years 15 days ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
106
Voted
4OR
2004
79views more  4OR 2004»
15 years 15 days ago
Constrained auction clearing in the Italian electricity market
Most of the liberalized electricity systems use the auction as a market model. The complexity of the underlying optimization formulation depends on the technical and regulatory con...
Patrizia Beraldi, Domenico Conforti, Chefi Triki, ...
99
Voted
VIROLOGY
2008
68views more  VIROLOGY 2008»
15 years 14 days ago
Internet attacks monitoring with dynamic connection redirection mechanisms
High-interaction honeypots are interesting as they help understand how attacks unfold on a compromised machine. However, observations are generally limited to the operations perfo...
Eric Alata, Ion Alberdi, Vincent Nicomette, Philip...
120
Voted
AROBOTS
2004
77views more  AROBOTS 2004»
15 years 14 days ago
Planetary Cliff Descent Using Cooperative Robots
Future robotic planetary exploration will need to traverse geographically diverse and challenging terrain. Cliffs, ravines, and fissures are of great scientific interest because th...
Erik Mumm, Shane Farritor, Paolo Pirjanian, Chris ...
98
Voted
AROBOTS
2004
205views more  AROBOTS 2004»
15 years 14 days ago
Building Terrain-Covering Ant Robots: A Feasibility Study
Robotics researchers have studied robots that can follow trails laid by other robots. We, on the other hand, study robots that leave trails in the terrain to cover closed terrain r...
Jonas Svennebring, Sven Koenig