Sciweavers

3161 search results - page 572 / 633
» Documenting framework behavior
Sort
View
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 10 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
COMPUTER
2007
135views more  COMPUTER 2007»
13 years 10 months ago
A Language for Human Action
and therefore should be implemented outside the sensory-motor system. This way, meaning for a concept amounts to the content of a symbolic expression, a definition of the concept ...
Gutemberg Guerra-Filho, Yiannis Aloimonos
IVS
2008
145views more  IVS 2008»
13 years 10 months ago
Towards a taxonomy of movement patterns
A review of research that has been carried out on data mining and visual analysis of movement patterns suggests that there is little agreement on the relevant types of movement pa...
Somayeh Dodge, Robert Weibel, Anna-Katharina Laute...
PE
2008
Springer
173views Optimization» more  PE 2008»
13 years 10 months ago
Improving fairness in a WRED-based DiffServ network: A fluid-flow approach
The DiffServ architecture has been proposed as a scalable approach for upgrading the Internet, adding service differentiation functionalities. However, several aspects of this arc...
Mario Barbera, Alfio Lombardo, Giovanni Schembra, ...
SIGMETRICS
2008
ACM
106views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Fully decentralized emulation of best-effort and processor sharing queues
Control of large distributed cloud-based services is a challenging problem. The Distributed Rate Limiting (DRL) paradigm was recently proposed as a mechanism for tackling this pro...
Rade Stanojevic, Robert Shorten