Sciweavers

2520 search results - page 361 / 504
» Model-checking behavioral programs
Sort
View
ISI
2007
Springer
13 years 10 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
CORR
2007
Springer
111views Education» more  CORR 2007»
13 years 10 months ago
A New Perspective on Multi-user Power Control Games in Interference Channels
This paper considers the problem of how to allocate power among competing users sharing a frequency-selective interference channel. We model the interaction between these selfish ...
Yi Su, Mihaela van der Schaar
AAMAS
1999
Springer
13 years 10 months ago
Verifying Compliance with Commitment Protocols
Interaction protocols are specific, often standard, constraints on the behaviors of autonomous agents in a multiagent system. Protocols are essential to the functioning of open sys...
Mahadevan Venkatraman, Munindar P. Singh
CORR
2008
Springer
128views Education» more  CORR 2008»
13 years 10 months ago
Electricity Demand and Energy Consumption Management System
This project describes the electricity demand and energy consumption management system and its application to Southern Peru smelter. It is composted of an hourly demand-forecastin...
Juan Ojeda Sarmiento
CNSM
2010
13 years 8 months ago
An investigation on the identification of VoIP traffic: Case study on Gtalk and Skype
The classification of encrypted traffic on the fly from network traces represents a particularly challenging application domain. Recent advances in machine learning provide the opp...
Riyad Alshammari, A. Nur Zincir-Heywood