Sciweavers

2874 search results - page 506 / 575
» Intrusion Detection: Systems and Models
Sort
View
AMC
2008
111views more  AMC 2008»
13 years 10 months ago
Chemical agent detector placement methodology
Terrorism is a threat to global peace in our world today and in the future this terrorist threat is surely going to be important. Global terrorist groups have highly sophisticated...
Cevriye Gencer, Emel Kizilkaya Aydogan, Abdullah S...
EUROSYS
2006
ACM
14 years 7 months ago
Using queries for distributed monitoring and forensics
Distributed systems are hard to build, profile, debug, and test. Monitoring a distributed system – to detect and analyze bugs, test for regressions, identify fault-tolerance pr...
Atul Singh, Petros Maniatis, Timothy Roscoe, Peter...
ECAL
1995
Springer
14 years 1 months ago
Elements of a Theory of Simulation
Arti cial Life and the more general area of Complex Systems does not have a uni ed theoretical framework although most theoretical work in these areas is based on simulation. This ...
Steen Rasmussen, Christopher L. Barrett
JUCS
2007
90views more  JUCS 2007»
13 years 10 months ago
High-level Structured Interactive Programs with Registers and Voices
Abstract: A model (consisting of rv-systems), a core programming language (for developing rv-programs), several specification and analysis techniques appropriate for modeling, pro...
Alexandru Popa, Alexandru Sofronia, Gheorghe Stefa...
TCSV
2008
155views more  TCSV 2008»
13 years 10 months ago
Heterogeneous Fusion of Omnidirectional and PTZ Cameras for Multiple Object Tracking
Dual-camera systems have been widely used in surveillance because of the ability to explore the wide field of view (FOV) of the omnidirectional camera and the wide zoom range of th...
Chung-Hao Chen, Yi Yao, David Page, Besma R. Abidi...