Sciweavers

2269 search results - page 335 / 454
» Behavioral Intrusion Detection
Sort
View
ICALT
2008
IEEE
14 years 4 months ago
The Virtual Conductor: Learning and Teaching about Music, Performing, and Conducting
The Virtual Conductor is an artificial conducting system that uses real-time audio analysis of music played by musicians and uses this analysis to animate a virtual human that act...
Anton Nijholt, Dennis Reidsma, Rob Ebbers, Mark te...
ICCCN
2007
IEEE
14 years 4 months ago
Attack Containment Framework for Large-Scale Critical Infrastructures
— We present an attack containment framework against value-changing attacks in large-scale critical infrastructures, based on early warning and cooperative response approaches. W...
Hoang Nguyen, Klara Nahrstedt
CAV
2007
Springer
118views Hardware» more  CAV 2007»
14 years 4 months ago
C32SAT: Checking C Expressions
C32SAT is a tool for checking C expressions. It can check whether a given C expression can be satisfied, is tautological, or always defined according to the ISO C99 standard. C32...
Robert Brummayer, Armin Biere
ISCAS
2006
IEEE
93views Hardware» more  ISCAS 2006»
14 years 4 months ago
Discontinuity-induced bifurcations in TCP/RED communication algorithms
— In this paper, we describe a simple second-order discrete-time model for the Transmission Control Protocol (TCP) with Random Early Detection (RED) algorithm. The TCP/RED mechan...
Mingjian Liu, A. Marciello, Mario di Bernardo, Lji...
FATES
2004
Springer
14 years 3 months ago
A Test Generation Framework for quiescent Real-Time Systems
We present an extension of Tretmans’ theory and algorithm for test generation for input-output transition systems to real-time systems. Our treatment is based on an operational i...
Laura Brandán Briones, Ed Brinksma