Sciweavers

2135 search results - page 150 / 427
» Dependability Analysis of CAN Networks: An Emulation-Based A...
Sort
View
ICCCN
2007
IEEE
14 years 2 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
BCS
2008
13 years 9 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002
ESANN
2007
13 years 9 months ago
Functional elements and networks in fMRI
Abstract. We propose a two-step approach for the analysis of functional magnetic resonance images, in the context of natural stimuli. In the first step, elements of functional bra...
Jarkko Ylipaavalniemi, Eerika Savia, Ricardo Vig&a...
INFFUS
2008
119views more  INFFUS 2008»
13 years 8 months ago
A scalable correlation aware aggregation strategy for wireless sensor networks
Sensors-to-sink data in wireless sensor networks (WSNs) are typically correlated with each other. Exploiting such correlation when performing data aggregation can result in consid...
Yujie Zhu, Ramanuja Vedantham, Seung-Jong Park, Ra...
EDOC
2007
IEEE
14 years 2 months ago
Modeling and Integrating Aspects into Component Architectures
Dependable software systems are difficult to develop because developers must understand and address several interdependent and pervasive dependability concerns. Features that addr...
Lydia Michotte, Robert B. France, Franck Fleurey