Sciweavers

438 search results - page 56 / 88
» Component Based Multi-Agent System Modeling and Analysis: A ...
Sort
View
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 7 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
FIW
2007
133views Communications» more  FIW 2007»
13 years 9 months ago
Conflict Detection in Call Control Using First-Order Logic Model Checking
Feature interaction detection methods, whether online or offline, depend on previous knowledge of conflicts between the actions executed by the features. This knowledge is usually ...
Ahmed F. Layouni, Luigi Logrippo, Kenneth J. Turne...
JOC
2011
104views more  JOC 2011»
12 years 10 months ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...
ROMAN
2007
IEEE
191views Robotics» more  ROMAN 2007»
14 years 2 months ago
Learning and Recognition of Object Manipulation Actions Using Linear and Nonlinear Dimensionality Reduction
— In this work, we perform an extensive statistical evaluation for learning and recognition of object manipulation actions. We concentrate on single arm/hand actions but study th...
Isabel Serrano Vicente, Danica Kragic, Jan-Olof Ek...
EDOC
2009
IEEE
13 years 11 months ago
Enterprise Architecture Analysis for Data Accuracy Assessments
- Poor data in information systems impede the quality of decision-making in many modern organizations. Manual business process activities and application services are never execute...
Per Närman, Pontus Johnson, Mathias Ekstedt, ...