Sciweavers

1554 search results - page 144 / 311
» Testing Polymorphic Behavior
Sort
View
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 8 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
RAS
2006
138views more  RAS 2006»
13 years 8 months ago
From pixels to multi-robot decision-making: A study in uncertainty
Mobile robots must cope with uncertainty from many sources along the path from interpreting raw sensor inputs to behavior selection to execution of the resulting primitive actions...
Peter Stone, Mohan Sridharan, Daniel Stronger, Gre...
KBS
2007
101views more  KBS 2007»
13 years 7 months ago
A Knowledge Base for the maintenance of knowledge extracted from web data
By applying web mining tools, significant patterns about the visitor behavior can be extracted from data originated in web sites. Supported by a domain expert, the patterns are v...
Juan D. Velásquez, Vasile Palade
CAI
2010
Springer
13 years 5 months ago
SMA - The Smyle Modeling Approach
Abstract. This paper introduces the model-based software development lifecycle model SMA--the Smyle Modeling Approach--which is centered around Smyle. Smyle is a dedicated learning...
Benedikt Bollig, Joost-Pieter Katoen, Carsten Kern...
CEC
2011
IEEE
12 years 8 months ago
Modeling HIV spread through sexual contact using a cellular automaton
Abstract—Having a risky sexual behavior increases the likelihood of infection by the Human Immunodeficiency Virus (HIV), which causes the Acquired Immunodeficiency Syndrome (AI...
Azadeh Alimadad, Vahid Dabbaghian, Suraj K. Singhk...