Sciweavers

305 search results - page 6 / 61
» Set Algebra for Service Behavior: Applications and Construct...
Sort
View
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
13 years 9 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
ICWE
2007
Springer
14 years 1 months ago
Model-driven Construction of Workflow-based Web Applications with Domain-specific Languages
The requirements for Web applications concerning workflow execution, interaction, aesthetics, federation and Web service integration are steadily increasing. Considering their comp...
Patrick Freudenstein, Jan Buck, Martin Nussbaumer,...
E4MAS
2006
Springer
13 years 11 months ago
Enhancing the Environment with a Law-Governed Service for Monitoring and Enforcing Behavior in Open Multi-Agent Systems
Environment is an essential part of any multi-agent system (MAS), since it provides the surrounding conditions for agents to exist. For some sort of systems, the environment can be...
Rodrigo B. de Paes, Gustavo R. de Carvalho, Ma&iac...
TON
2010
129views more  TON 2010»
13 years 6 months ago
QoS-based manycasting over optical burst-switched (OBS) networks
Abstract—Many distributed applications require a group of destinations to be coordinated with a single source. Multicasting is a communication paradigm to implement these distrib...
Balagangadhar G. Bathula, Vinod Vokkarane
ESORICS
2006
Springer
13 years 11 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter