Sciweavers

13917 search results - page 31 / 2784
» Abstraction of Probabilistic Systems
Sort
View
ISMIS
2005
Springer
15 years 10 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
FSEN
2009
Springer
15 years 11 months ago
The Complexity of Reachability in Randomized Sabotage Games
Abstract. We analyze a model of fault-tolerant systems in a probabilistic setting. The model has been introduced under the name of “sabotage games”. A reachability problem over...
Dominik Klein, Frank G. Radmacher, Wolfgang Thomas
AAAI
1998
15 years 5 months ago
Procedural Help in Andes: Generating Hints Using a Bayesian Network Student Model
One of the most important problems for an intelligent tutoring system is deciding how to respond when a student asks for help. Responding cooperatively requires an understanding o...
Abigail S. Gertner, Cristina Conati, Kurt VanLehn
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
15 years 11 months ago
An approximate dynamic programming approach to probabilistic reachability for stochastic hybrid systems
— This paper addresses the computational overhead involved in probabilistic reachability computations for a general class of controlled stochastic hybrid systems. An approximate ...
Alessandro Abate, Maria Prandini, John Lygeros, Sh...
UM
2007
Springer
15 years 10 months ago
Mobile Opportunistic Planning: Methods and Models
Abstract. We present a study exploring the promise of developing computational systems to support the discovery and execution of opportunistic activities in mobile settings. We int...
Eric Horvitz, Paul Koch, Muru Subramani