Sciweavers

2269 search results - page 393 / 454
» Behavioral Intrusion Detection
Sort
View
ASIAMS
2009
IEEE
14 years 4 months ago
CSI Feedback Model in the Context of Adaptive Cognitive Radio Systems
Cognitive radio has the ability to sense the environment and adapt its behavior to optimize communication features, such as quality of service in the presence of interference and ...
Haleh Hosseini, Anis Izzati Ahmad Zamani, Sharifah...
HRI
2009
ACM
14 years 4 months ago
Situated messages for asynchronous human-robot interaction
An ongoing issue in human robot interaction (HRI) is how people and robots communicate with one another. While there is considerable work in real-time human-robot communication, f...
Nicolai Marquardt, James Everett Young, Ehud Sharl...
SAC
2009
ACM
14 years 4 months ago
LTS semantics for use case models
Formalization is a necessary precondition for the specification of precise and unambiguous use case models, which serve as reference points for the design and implementation of so...
Daniel Sinnig, Patrice Chalin, Ferhat Khendek
ICSE
2009
IEEE-ACM
14 years 4 months ago
Mining recurrent activities: Fourier analysis of change events
Within the field of software repository mining, it is common practice to extract change-events from source control systems and then abstract these events to allow for different a...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
DSN
2009
IEEE
14 years 4 months ago
System safety as an emergent property in composite systems
Decomposition is used to manage system complexity, but is problematic for emergent properties such as system safety. Previously, we introduced Indirect Control Path Analysis (ICPA...
Jennifer Black, Philip Koopman