Sciweavers

1554 search results - page 261 / 311
» Testing Polymorphic Behavior
Sort
View
TSMC
2008
172views more  TSMC 2008»
13 years 7 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
4OR
2004
79views more  4OR 2004»
13 years 7 months ago
Constrained auction clearing in the Italian electricity market
Most of the liberalized electricity systems use the auction as a market model. The complexity of the underlying optimization formulation depends on the technical and regulatory con...
Patrizia Beraldi, Domenico Conforti, Chefi Triki, ...
VIROLOGY
2008
68views more  VIROLOGY 2008»
13 years 7 months ago
Internet attacks monitoring with dynamic connection redirection mechanisms
High-interaction honeypots are interesting as they help understand how attacks unfold on a compromised machine. However, observations are generally limited to the operations perfo...
Eric Alata, Ion Alberdi, Vincent Nicomette, Philip...
AROBOTS
2004
77views more  AROBOTS 2004»
13 years 7 months ago
Planetary Cliff Descent Using Cooperative Robots
Future robotic planetary exploration will need to traverse geographically diverse and challenging terrain. Cliffs, ravines, and fissures are of great scientific interest because th...
Erik Mumm, Shane Farritor, Paolo Pirjanian, Chris ...
AROBOTS
2004
205views more  AROBOTS 2004»
13 years 7 months ago
Building Terrain-Covering Ant Robots: A Feasibility Study
Robotics researchers have studied robots that can follow trails laid by other robots. We, on the other hand, study robots that leave trails in the terrain to cover closed terrain r...
Jonas Svennebring, Sven Koenig