Sciweavers

3224 search results - page 601 / 645
» On Checking Model Checkers
Sort
View
131
Voted
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 12 days ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
119
Voted
ICDM
2009
IEEE
150views Data Mining» more  ICDM 2009»
15 years 10 days ago
Filtering and Refinement: A Two-Stage Approach for Efficient and Effective Anomaly Detection
Anomaly detection is an important data mining task. Most existing methods treat anomalies as inconsistencies and spend the majority amount of time on modeling normal instances. A r...
Xiao Yu, Lu An Tang, Jiawei Han
114
Voted
ICIP
2009
IEEE
15 years 9 days ago
Multichannel dual domain infrared target tracking for highly evolutionary target signatures
We introduce a new SIR particle filter that performs tracking in a joint feature space where pixel domain data are fused with measurements obtained from an 18-channel modulation d...
Colin M. Johnston, Nick A. Mould, Joseph P. Havlic...
152
Voted
ICOODB
2009
246views Database» more  ICOODB 2009»
15 years 9 days ago
Compiler Plugins Can Handle Nested Languages: AST-Level Expansion of LINQ Queries for Java
The integration of database and programming languages is made difficult by the different data models and type systems prevalent in each field. Functional-object query languages con...
Miguel Garcia
CDC
2010
IEEE
129views Control Systems» more  CDC 2010»
14 years 9 months ago
A symbolic approach to controlling piecewise affine systems
Abstract-- We present a computational framework for automatic synthesis of a feedback control strategy for a piecewise affine (PWA) system from a specification given as a Linear Te...
Jana Tumova, Boyan Yordanov, Calin Belta, Ivana Ce...