Sciweavers

513 search results - page 87 / 103
» Finitely Based, Finite Sets of Words
Sort
View
ACSAC
2003
IEEE
14 years 21 days ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
PCI
2001
Springer
13 years 12 months ago
Communicating X-Machines: From Theory to Practice
Formal modeling of complex systems is a non-trivial task, especially if a formal method does not facilitate separate development of the components of a system. This paper describes...
Petros Kefalas, George Eleftherakis, Evangelos Keh...
IJCNN
2000
IEEE
13 years 11 months ago
Predictive Multiple Model Switching Control with the Self-Organizing Map
—A predictive, multiple model control strategy is developed by extension of self-organizing map (SOM) local dynamic modeling of nonlinear autonomous systems to a control framewor...
Mark A. Motter
ICCAD
1994
IEEE
134views Hardware» more  ICCAD 1994»
13 years 11 months ago
Boolean constrained encoding: a new formulation and a case study
1 This paper provides a new, generalized approach to the problem of encoding information as vectors of binary digits. We furnish a formal definition for the Boolean constrained enc...
Ney Laert Vilar Calazans
ESCIENCE
2006
IEEE
13 years 11 months ago
Designing Workflow Components for e-Science
In this paper we present a general domain for the analysis of workflows and workflow components based on the notion of a collection of Turing machines sharing a set of tapes. We s...
Frank Terpstra, Pieter W. Adriaans