Sciweavers

2269 search results - page 331 / 454
» Behavioral Intrusion Detection
Sort
View
ICARIS
2009
Springer
14 years 4 months ago
An Error Propagation Algorithm for Ad Hoc Wireless Networks
Abstract. We were inspired by the role of co-stimulation in the Biological immune system (BIS). We propose and evaluate an algorithm for energy efficient misbehavior detection in a...
Martin Drozda, Sven Schaust, Sebastian Schildt, He...
IJCNN
2007
IEEE
14 years 4 months ago
A Cell Assembly Model of Sequential Memory
—Perception, prediction and generation of sequences is a fundamental aspect of human behavior and depends on the ability to detect serial order. This paper presents a plausible m...
Hina Ghalib, Christian R. Huyck
DSN
2006
IEEE
14 years 4 months ago
Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures
—Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management systems. To achieve the h...
Albert Meixner, Daniel J. Sorin
CODES
2002
IEEE
14 years 3 months ago
Worst-case performance analysis of parallel, communicating software processes
In this paper we present a method to perform static timing analysis of SystemC models, that describe parallel, communicating software processes.The paper combines a worstcase exec...
Axel Siebenborn, Oliver Bringmann, Wolfgang Rosens...
DMIN
2007
110views Data Mining» more  DMIN 2007»
13 years 11 months ago
Mining for Structural Anomalies in Graph-based Data
—In this paper we present graph-based approaches to mining for anomalies in domains where the anomalies consist of unexpected entity/relationship alterations that closely resembl...
William Eberle, Lawrence B. Holder