Sciweavers

1993 search results - page 297 / 399
» On Action Theory Change
Sort
View
JSAC
2006
165views more  JSAC 2006»
13 years 10 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
JLP
2007
114views more  JLP 2007»
13 years 10 months ago
Deaccumulation techniques for improving provability
Several induction theorem provers were developed to verify functional programs mechanically. Unfortunately, automatic verification often fails for functions with accumulating arg...
Jürgen Giesl, Armin Kühnemann, Janis Voi...
AAMAS
2004
Springer
13 years 10 months ago
Functional Validation in Grid Computing
The development of the World Wide Web has changed the way we think about information. Information on the web is distributed, updates are made asynchronously and resources come onli...
Guofei Jiang, George Cybenko
CSCW
1999
ACM
13 years 9 months ago
Layers of Silence, Arenas of Voice: The Ecology of Visible and Invisible Work
No work is inherently either visible or invisible. We always "see" work through a selection of indicators: straining muscles, finished artifacts, a changed state of affai...
Susan Leigh Star, Anselm Strauss
TOMACS
2002
101views more  TOMACS 2002»
13 years 9 months ago
Efficient simulation of a tandem Jackson network
In this paper we consider a two-node tandem Jackson network. Starting from a given state, we are interested in estimating the probability that the content of the second buffer exc...
Dirk P. Kroese, Victor F. Nicola