Sciweavers

169 search results - page 26 / 34
» Automatically Generating Models for Botnet Detection
Sort
View
OOPSLA
2009
Springer
14 years 2 months ago
Coherent reaction
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
Jonathan Edwards
ASWEC
2007
IEEE
13 years 12 months ago
Managing Conflicts When Using Combination Strategies to Test Software
Testers often represent systems under test in input parameter models. These contain parameters with associated values. Combinations of parameter values, with one value for each pa...
Mats Grindal, Jeff Offutt, Jonas Mellin
IJCAI
2007
13 years 9 months ago
Common Sense Based Joint Training of Human Activity Recognizers
Given sensors to detect object use, commonsense priors of object usage in activities can reduce the need for labeled data in learning activity models. It is often useful, however,...
Shiaokai Wang, William Pentney, Ana-Maria Popescu,...
ACSAC
2004
IEEE
13 years 11 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
PACT
2005
Springer
14 years 1 months ago
Optimal Behavior of a Moving Creature in the Cellular Automata Model
The goal of our investigation is to find automatically the best rule for a cell in the cellular automata model. The cells are either of type Obstacle, Empty or Creature. Only Crea...
Mathias Halbach, Rolf Hoffmann