Sciweavers

900 search results - page 15 / 180
» On the observational theory of the CPS-calculus
Sort
View
MDM
2009
Springer
126views Communications» more  MDM 2009»
14 years 4 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
IWIA
2006
IEEE
14 years 4 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
UAI
2004
13 years 11 months ago
Predictive State Representations: A New Theory for Modeling Dynamical Systems
Modeling dynamical systems, both for control purposes and to make predictions about their behavior, is ubiquitous in science and engineering. Predictive state representations (PSR...
Satinder P. Singh, Michael R. James, Matthew R. Ru...
CN
2004
146views more  CN 2004»
13 years 10 months ago
Spatio-temporal correlation: theory and applications for wireless sensor networks
Wireless Sensor Networks (WSN) are characterized by the dense deployment of sensor nodes that continuously observe physical phenomenon. Due to high density in the network topology...
Mehmet C. Vuran, Özgür B. Akan, Ian F. A...
OOPSLA
2007
Springer
14 years 4 months ago
From developer's head to developer tests: characterization, theories, and preventing one more bug
Unit testing frameworks like JUnit are a popular and effective way to prevent developer bugs. We are investigating two ways of building on these frameworks to prevent more bugs wi...
David Saff