Sciweavers

2269 search results - page 331 / 454
» Behavioral Intrusion Detection
Sort
View
116
Voted
ICARIS
2009
Springer
15 years 9 months ago
An Error Propagation Algorithm for Ad Hoc Wireless Networks
Abstract. We were inspired by the role of co-stimulation in the Biological immune system (BIS). We propose and evaluate an algorithm for energy efficient misbehavior detection in a...
Martin Drozda, Sven Schaust, Sebastian Schildt, He...
96
Voted
IJCNN
2007
IEEE
15 years 9 months ago
A Cell Assembly Model of Sequential Memory
—Perception, prediction and generation of sequences is a fundamental aspect of human behavior and depends on the ability to detect serial order. This paper presents a plausible m...
Hina Ghalib, Christian R. Huyck
133
Voted
DSN
2006
IEEE
15 years 8 months ago
Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures
—Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management systems. To achieve the h...
Albert Meixner, Daniel J. Sorin
150
Voted
CODES
2002
IEEE
15 years 7 months ago
Worst-case performance analysis of parallel, communicating software processes
In this paper we present a method to perform static timing analysis of SystemC models, that describe parallel, communicating software processes.The paper combines a worstcase exec...
Axel Siebenborn, Oliver Bringmann, Wolfgang Rosens...
125
Voted
DMIN
2007
110views Data Mining» more  DMIN 2007»
15 years 4 months ago
Mining for Structural Anomalies in Graph-based Data
—In this paper we present graph-based approaches to mining for anomalies in domains where the anomalies consist of unexpected entity/relationship alterations that closely resembl...
William Eberle, Lawrence B. Holder