Sciweavers

826 search results - page 135 / 166
» What Triggers a Behavior
Sort
View
108
Voted
IMC
2010
ACM
14 years 10 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
SECON
2010
IEEE
14 years 10 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
103
Voted
GEM
2009
14 years 10 months ago
Evidence of Coevolution in Multi-objective Evolutionary Algorithms
- This paper demonstrates that simple yet important characteristics of coevolution can occur in evolutionary algorithms when only a few conditions are met. We find that interaction...
James Whitacre
108
Voted
ENTCS
2011
99views more  ENTCS 2011»
14 years 7 months ago
Symmetry and Composition in Probabilistic Theories
The past decade has seen a remarkable resurgence of the old programme of finding more or less a priori axioms for the mathematical framework of quantum mechanics. The new impetus...
Alexander Wilce
HICSS
2011
IEEE
198views Biometrics» more  HICSS 2011»
14 years 4 months ago
Virtual Reality Meets Scrum: How a Senior Team Moved from Management to Leadership
The role of managers in a Scrum organization is a topic of high interest with almost no research. Changes in management roles and behaviors were evaluated in a rapidly growing, so...
Dina Friis, Jens Ostergaard, Jeff Sutherland