Sciweavers

2715 search results - page 322 / 543
» Network bucket testing
Sort
View
RAID
2010
Springer
13 years 8 months ago
Community Epidemic Detection Using Time-Correlated Anomalies
Abstract. An epidemic is malicious code running on a subset of a community, a homogeneous set of instances of an application. Syzygy is an epidemic detection framework that looks f...
Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken
GEM
2009
13 years 7 months ago
Evolutionary Methods in Self-organizing System Design
Self-organizing systems could serve as a solution for many technical problems where properties like robustness, scalability, and adaptability are required. However, despite all the...
Istvan Fehervari, Wilfried Elmenreich
PUC
2011
13 years 4 months ago
A research methodology for evaluating location aware experiences
Abstract Research field trials of fully functional prototypes of location-based games are an effective way to test game designs and develop an understanding of what makes games co...
Josephine Reid, Richard Hull 0002, Ben J. C. Clayt...
DIMVA
2011
13 years 1 months ago
Escape from Monkey Island: Evading High-Interaction Honeyclients
Abstract. High-interaction honeyclients are the tools of choice to detect malicious web pages that launch drive-by-download attacks. Unfortunately, the approach used by these tools...
Alexandros Kapravelos, Marco Cova, Christopher Kru...
IWANN
2011
Springer
13 years 17 days ago
A Preliminary Study on the Use of Fuzzy Rough Set Based Feature Selection for Improving Evolutionary Instance Selection Algorith
In recent years, the increasing interest in fuzzy rough set theory has allowed the definition of novel accurate methods for feature selection. Although their stand-alone applicati...
Joaquín Derrac, Chris Cornelis, Salvador Ga...