Sciweavers

265 search results - page 35 / 53
» A Temporal Logic Based Framework for Intrusion Detection
Sort
View
IRI
2008
IEEE
14 years 2 months ago
Model check stochastic supply chains
—Supply chain [2], [6] is an important component of business operations. Understanding its stochastic behaviors is the key to risk analysis and performance evaluation in supply c...
Li Tan, Shenghan Xu
DBSEC
2008
136views Database» more  DBSEC 2008»
13 years 9 months ago
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems
Pervasive computing applications typically involve cooperation among a number of entities spanning multiple organizations. Any security breach in any single entity can have very fa...
Indrajit Ray, Nayot Poolsappasit, Rinku Dewri
ISCC
2007
IEEE
104views Communications» more  ISCC 2007»
14 years 1 months ago
Chronicle Recognition for Mobility Management Triggers
An optimally working mobile system requires tight cooperation and an information stream that flows impeccably between its components. This, however, is not the current state of t...
Christophe Dousson, Kostas Pentikousis, Tiia Sutin...
TASLP
2008
91views more  TASLP 2008»
13 years 7 months ago
Time-Scale Modification of Audio Signals Using Enhanced WSOLA With Management of Transients
In this paper, we present an algorithm for time-scale modification of music signals, based on the waveform similarity overlap-and-add technique (WSOLA). A well-known disadvantage o...
S. Grofit, Y. Lavner
FUIN
2008
177views more  FUIN 2008»
13 years 7 months ago
A Multi-facet Approach to Dynamic Agent Systems
We are concerned with the problem of defining a complex, hybrid, agent based discrete system in a modular way. The modularity results from looking at the system from a number of di...
Marek A. Bednarczyk, Wieslaw Pawlowski, Luca Berna...