Sciweavers

738 search results - page 92 / 148
» Behavioral Systems Theory: A Survey
Sort
View
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 7 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
COCOON
2009
Springer
14 years 3 months ago
On the Performances of Nash Equilibria in Isolation Games
: Network games play a fundamental role in understanding behavior in many domains, ranging from communication networks through markets to social networks. Such networks are used, a...
Vittorio Bilò, Michele Flammini, Gianpiero ...
AAAI
2012
11 years 11 months ago
Strategic Advice Provision in Repeated Human-Agent Interactions
This paper addresses the problem of automated advice provision in settings that involve repeated interactions between people and computer agents. This problem arises in many real ...
Amos Azaria, Zinovi Rabinovich, Sarit Kraus, Claud...
NOSSDAV
2009
Springer
14 years 3 months ago
Providing statistically guaranteed streaming quality for peer-to-peer live streaming
Most of the literature on peer-to-peer (P2P) live streaming focuses on how to provide best-effort streaming quality by efficiently using the system bandwidth; however, there is n...
Miao Wang, Lisong Xu, Byrav Ramamurthy
HICSS
2005
IEEE
173views Biometrics» more  HICSS 2005»
14 years 2 months ago
Implementing Rule-Based Monitors within a Framework for Continuous Requirements Monitoring
With the increasing complexity of information systems, it is becoming increasingly unclear as to how information system behaviors relate to stated requirements. Although requireme...
William N. Robinson