Sciweavers

5639 search results - page 188 / 1128
» Timed Abstract Non-interference
Sort
View
ICISC
2004
169views Cryptology» more  ICISC 2004»
15 years 3 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
NETWORKING
2000
15 years 3 months ago
Real-Time Traffic Transmission over the Internet
Abstract. Multimedia applications require the transmission of realtime streams over a network. These streams often exhibit variable bandwidth requirements, and require high bandwid...
Marco Furini, Donald F. Towsley
HASE
2008
IEEE
15 years 2 months ago
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by Use of Executable Formal Specifications
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
Kohei Sakurai, Péter Bokor, Neeraj Suri
APIN
2008
305views more  APIN 2008»
15 years 2 months ago
A generalized model for financial time series representation and prediction
Abstract Traditional financial analysis systems utilize lowlevel price data as their analytical basis. For example, a decision-making system for stock predictions regards raw price...
Depei Bao
CORR
2010
Springer
110views Education» more  CORR 2010»
15 years 2 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin