Sciweavers

1127 search results - page 18 / 226
» Theory Extension in ACL2(r)
Sort
View
ICASSP
2011
IEEE
13 years 7 days ago
Detecting low-rate periodic events in Internet traffic using renewal theory
In our previous work [1, 2] we studied detection of anomalies in packet arrival times for computer networks, most detection of denialof-service (DoS) attacks in Internet traffic....
Sean McPherson, Antonio Ortega
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
GG
2004
Springer
14 years 1 months ago
Fundamental Theory for Typed Attributed Graph Transformation
The concept of typed attributed graph transformation is most significant for modeling and meta modeling in software engineering and visual languages, but up to now there is no ade...
Hartmut Ehrig, Ulrike Prange, Gabriele Taentzer
GIS
2000
ACM
13 years 8 months ago
Fuzzy set theory and thematic maps: accuracy assessment and area estimation
Traditionally, the classes in thematic maps have been treated as crisp sets, using classical set theory. In this formulation, map classes are assumed to be mutually exclusive and e...
Curtis E. Woodcock, Sucharita Gopal
RR
2010
Springer
13 years 7 months ago
Defeasibility in Answer Set Programs via Argumentation Theories
Defeasible reasoning has been studied extensively in the last two decades and many different and dissimilar approaches are currently on the table. This multitude of ideas has made...
Hui Wan, Michael Kifer, Benjamin N. Grosof