Sciweavers

779 search results - page 74 / 156
» Modeling Dependable Systems using Hybrid Bayesian Networks
Sort
View
JSAC
2008
115views more  JSAC 2008»
13 years 8 months ago
A Game-Theoretical Study of Robust Networked Systems
This paper analyses the robustness of networked systems from a game-theoretical perspective. Networked systems often consist of several subsystems sharing resources interdependentl...
Chi-Kin Chau
BROADNETS
2005
IEEE
14 years 2 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
ICRA
2008
IEEE
123views Robotics» more  ICRA 2008»
14 years 3 months ago
Target-directed attention: Sequential decision-making for gaze planning
— It is widely agreed that efficient visual search requires the integration of target-driven top-down information and image-driven bottom-up information. Yet the problem of gaze...
Julia Vogel, Nando de Freitas
PAMI
2010
174views more  PAMI 2010»
13 years 7 months ago
Image Segmentation with a Unified Graphical Model
—We propose a unified graphical model that can represent both the causal and noncausal relationships among random variables and apply it to the image segmentation problem. Specif...
Lei Zhang 0011, Qiang Ji
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 2 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...