Sciweavers

2269 search results - page 406 / 454
» Behavioral Intrusion Detection
Sort
View
SENSYS
2003
ACM
14 years 3 months ago
Cooperative tracking with binary-detection sensor networks
We present a novel method for tracking the movement of people or vehicles in open outdoor environments using sensor networks. Unlike other sensor network-based methods, which depe...
Kirill Mechitov, Sameer Sundresh, YoungMin Kwon, G...
FMCO
2003
Springer
114views Formal Methods» more  FMCO 2003»
14 years 3 months ago
Synchronous Closing and Flow Analysis for Model Checking Timed Systems
Abstract. Formal methods, in particular model checking, are increasingly accepted as integral part of system development. With large software systems beyond the range of fully auto...
Natalia Ioustinova, Natalia Sidorova, Martin Steff...
ASUNAM
2009
IEEE
14 years 3 months ago
Mining the Dynamics of Music Preferences from a Social Networking Site
In this paper we present an application of our incremental graph clustering algorithm (DENGRAPH) on a data set obtained from the music community site Last.fm. The aim of our study...
Nico Schlitter, Tanja Falkowski
ISCA
2002
IEEE
102views Hardware» more  ISCA 2002»
14 years 2 months ago
Implementing Optimizations at Decode Time
The number of pipeline stages separating dynamic instruction scheduling from instruction execution has increased considerably in recent out-of-order microprocessor implementations...
Ilhyun Kim, Mikko H. Lipasti
LCN
2002
IEEE
14 years 2 months ago
Performance Analysis of Token-Based Fast TCP in Systems Supporting Large Windows
Since TCP can only detect congestion after packet losses have already happened, various forms of Fast TCP (FTCP) have been proposed to notify congestion early and avoid packet los...
Fei Peng, Victor C. M. Leung