Sciweavers

1995 search results - page 108 / 399
» From Data Flow Networks to Process Algebras
Sort
View
FSKD
2006
Springer
106views Fuzzy Logic» more  FSKD 2006»
15 years 8 months ago
Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
Chengchen Hu, Zhen Liu, Zhen Chen, Bin Liu
IS
2008
15 years 4 months ago
Conformance checking of processes based on monitoring real behavior
Many companies have adopted Process-aware Information Systems (PAIS) to support their business processes in some form. On the one hand these systems typically log events (e.g., in ...
Anne Rozinat, Wil M. P. van der Aalst
IJON
2007
91views more  IJON 2007»
15 years 4 months ago
Dynamics of parameters of neurophysiological models from phenomenological EEG modeling
We investigate a recently proposed method for the analysis of oscillatory patterns in EEG data, with respect to its capacity of further quantifying processes on slower (< 1 Hz)...
E. Olbrich, Thomas Wennekers
TOMACS
2002
110views more  TOMACS 2002»
15 years 4 months ago
Rapid model parameterization from traffic measurements
The utility of simulations and analysis heavily relies on good models of network traffic. While network traffic constantly changing over time, existing approaches typically take y...
Kun-Chan Lan, John S. Heidemann
KIVS
2005
Springer
15 years 10 months ago
From Location to Position Management: User Tracking for Location-based Services
: This paper compares traditional location management, which focuses on tracking mobile subscribers in the topology of a cellular network, with position management, which we defin...
Axel Küpper, Georg Treu