Sciweavers

2686 search results - page 369 / 538
» Using a neural network in the software testing process
Sort
View
147
Voted
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 3 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
124
Voted
DANCE
2002
IEEE
15 years 8 months ago
A Framework for Building Complex Netcentric Systems on Active Network
Active applications can add value to communication. Yet it involves sophisticated domain knowledge and complex development process. In this paper we discuss a framework for the co...
Javed I. Khan, Seung Su Yang
154
Voted
SIAMCO
2011
14 years 10 months ago
Asymptotically Optimal Controls for Time-Inhomogeneous Networks
Abstract. A framework is introduced for the identification of controls for single-class timevarying queueing networks that are asymptotically optimal in the so-called uniform acce...
Milica Cudina, Kavita Ramanan
143
Voted
MIS
1998
Springer
103views Multimedia» more  MIS 1998»
15 years 7 months ago
NETCICATS: Network-Conscious Image Compression and Transmission System
NETCICATS is a software system for empirically evaluating network-conscious image compression, an approach that does not simply optimize compression, but which optimizes overall pe...
Sami Iren, Paul D. Amer, Phillip T. Conrad
177
Voted
NORDICHI
2004
ACM
15 years 9 months ago
Facilitating user interface adaptation to mobile devices
One vision of a context-aware pervasive networking environment promises the user a seamless access to surrounding services using her personal mobile device. This requires that the...
Pertti Repo