Sciweavers

2269 search results - page 368 / 454
» Behavioral Intrusion Detection
Sort
View
BPM
2010
Springer
163views Business» more  BPM 2010»
13 years 11 months ago
Self-adjusting Recommendations for People-Driven Ad-Hoc Processes
Abstract. A company's ability to flexibly adapt to changing business requirements is one key factor to remain competitive. The required flexibility in peopledriven processes i...
Christoph Dorn, Thomas Burkhart, Dirk Werth, Schah...
ETS
2010
IEEE
140views Hardware» more  ETS 2010»
13 years 11 months ago
Increasing reliability of programmable mixed-signal systems by applying design diversity redundancy
This paper explores the concept of design diversity redundancy applied to mixed-signal (MS) circuit blocks, as a proposal to increase system reliability. Three different implement...
Gabriel de M. Borges, Luiz F. Gonçalves, Ti...
ICA
2010
Springer
13 years 10 months ago
Decomposition of EEG Signals for Multichannel Neural Activity Analysis in Animal Experiments
We describe in this paper an advanced protocol for the discrimination and the classification of neuronal spike waveforms within multichannel electrophysiological recordings. Sparse...
Vincent Vigneron, Hsin Chen, Yen-Tai Chen, Hsin-Yi...
CCR
2010
100views more  CCR 2010»
13 years 10 months ago
Towards understanding bugs in open source router software
Software errors and vulnerabilities in core Internet routers have led to several high-profile attacks on the Internet infrastructure and numerous outages. Building an understandin...
Zuoning Yin, Matthew Caesar, Yuanyuan Zhou
CLEIEJ
2006
126views more  CLEIEJ 2006»
13 years 10 months ago
Software Based Fault Tolerance against Byzantine Failures
The proposed software technique is a very low cost and an effective solution towards designing Byzantine fault tolerant computing application systems that are not so safety critic...
Goutam Kumar Saha