- In this paper, we propose a unitary tool for modeling and analysis of discrete event systems monitoring. Uncertain knowledge of such tasks asks specific reasoning and adapted fuz...
Daniel I. Racoceanu, Eugenia Minca, Noureddine Zer...
Even the best laid plans can fail, and robot plans executed in real world domains tend to do so often. The ability of a robot to reliably monitor the execution of plans and detect...
Abdelbaki Bouguerra, Lars Karlsson, Alessandro Saf...
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
End-to-end reordering of packets on Internet is investigated. Packet streams transferred over the Internet are used to analyze the long-term and shortterm trends in reordering. Re...
Analysis of network and application pegormance is traditionally based on mathematical models derived from first principles. Such models are usually complex, diflcult to use, and d...