Sciweavers

1541 search results - page 294 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
102
Voted
CEC
2008
IEEE
15 years 6 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
WWIC
2010
Springer
193views Communications» more  WWIC 2010»
15 years 4 months ago
0day Anomaly Detection Made Possible Thanks to Machine Learning
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...
Philippe Owezarski, Johan Mazel, Yann Labit
88
Voted
DATAMINE
2006
127views more  DATAMINE 2006»
15 years 13 days ago
Computing LTS Regression for Large Data Sets
Least trimmed squares (LTS) regression is based on the subset of h cases (out of n) whose least squares t possesses the smallest sum of squared residuals. The coverage h may be se...
Peter Rousseeuw, Katrien van Driessen
FDG
2009
ACM
15 years 5 months ago
Affective game engines: motivation and requirements
The tremendous advances in gaming technologies over the past decade have focused primarily on the physical realism of the game environment and game characters, and the complexity ...
Eva Hudlicka
SIGSOFT
2001
ACM
16 years 1 months ago
WREN---an environment for component-based development
Prior research in software environments focused on three important problems-- tool integration, artifact management, and process guidance. The context for that research, and hence...
Chris Lüer, David S. Rosenblum