Sciweavers

807 search results - page 121 / 162
» Genetic Algorithms and Discrete Event Systems: An Applicatio...
Sort
View
SAINT
2003
IEEE
14 years 2 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
ICC
2009
IEEE
109views Communications» more  ICC 2009»
14 years 3 months ago
Measurement-Based Modeling of Vehicle-to-Vehicle MIMO Channels
— Vehicle-to-vehicle (VTV) communications are of interest for applications within traffic safety and congestion avoidance, but the development of suitable communications systems...
Johan Karedal, Fredrik Tufvesson, Nicolai Czink, A...
SIAMSC
2008
142views more  SIAMSC 2008»
13 years 8 months ago
A Fast Direct Solver for the Biharmonic Problem in a Rectangular Grid
We present a fast direct solver methodology for the Dirichlet biharmonic problem in a rectangle. The solver is applicable in the case of the second order Stephenson scheme [34] as ...
Matania Ben-Artzi, Jean-Pierre Croisille, Dalia Fi...
BPM
2009
Springer
168views Business» more  BPM 2009»
14 years 3 months ago
Divide-and-Conquer Strategies for Process Mining
The goal of Process Mining is to extract process models from logs of a system. Among the possible models to represent a process, Petri nets is an ideal candidate due to its graphic...
Josep Carmona, Jordi Cortadella, Michael Kishinevs...
DATE
2005
IEEE
164views Hardware» more  DATE 2005»
14 years 2 months ago
Automated Synthesis of Assertion Monitors using Visual Specifications
Automated synthesis of monitors from high-level properties plays a significant role in assertion-based verification. We present here a methodology to synthesize assertion monitors...
Ambar A. Gadkari, S. Ramesh