Sciweavers

2269 search results - page 380 / 454
» Behavioral Intrusion Detection
Sort
View
UMUAI
2008
108views more  UMUAI 2008»
13 years 10 months ago
Developing a generalizable detector of when students game the system
Some students, when working in interactive learning environments, attempt to "game the system", attempting to succeed in the environment by exploiting properties of the s...
Ryan Shaun Joazeiro de Baker, Albert T. Corbett, I...
WICOMM
2002
121views more  WICOMM 2002»
13 years 9 months ago
Open issues on TCP for mobile computing
We discuss the design principles of TCP within the context of heterogeneous wired/wireless networks and mobile networking. We identify three shortcomings in TCP's behavior: (...
Vassilios Tsaoussidis, Ibrahim Matta
MIDDLEWARE
2010
Springer
13 years 8 months ago
LiFTinG: Lightweight Freerider-Tracking in Gossip
This paper presents LiFTinG, the first protocol to detect freeriders, including colluding ones, in gossip-based content dissemination systems with asymmetric data exchanges. LiFT...
Rachid Guerraoui, Kévin Huguenin, Anne-Mari...
RTAS
2010
IEEE
13 years 8 months ago
Selecting Server Parameters for Predictable Runtime Monitoring
—Application of runtime monitoring to maintain the health of an embedded real-time software system requires that anomalous behavior be detected within a bounded time while preser...
Haitao Zhu, Steve Goddard, Matthew B. Dwyer
SIGDIAL
2010
13 years 7 months ago
The Dynamics of Action Corrections in Situated Interaction
In spoken communications, correction utterances, which are utterances correcting other participants utterances and behaviors, play crucial roles, and detecting them is one of the ...
Antoine Raux, Mikio Nakano