Sciweavers

427 search results - page 60 / 86
» Monitoring and controlling of a multi - agent based workflow...
Sort
View
CIT
2004
Springer
14 years 1 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
RE
2004
Springer
14 years 1 months ago
Fluent-Based Animation: Exploiting the Relation between Goals and Scenarios for Requirements Validation
Scenarios and goals are effective and popular techniques for requirements definition. Validation is essential in order to ensure that they represent what stakeholders actually wan...
Sebastián Uchitel, Robert Chatley, Jeff Kra...
RAID
2004
Springer
14 years 1 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
BMCBI
2005
179views more  BMCBI 2005»
13 years 7 months ago
MARS: Microarray analysis, retrieval, and storage system
Background: Microarray analysis has become a widely used technique for the study of geneexpression patterns on a genomic scale. As more and more laboratories are adopting microarr...
Michael Maurer, Robert Molidor, Alexander Sturn, J...
RAS
2000
170views more  RAS 2000»
13 years 7 months ago
Visual servoing and appearance for navigation
We address the problem of visual-based navigation of a mobile robot in indoors environments. The robot control system is based on a single camera to provide the required visual fe...
Raquel Frizera Vassallo, Hans J. Schneebeli, Jos&e...