Sciweavers

4250 search results - page 229 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
UMUAI
1998
128views more  UMUAI 1998»
13 years 10 months ago
Using Decision Trees for Agent Modeling: Improving Prediction Performance
A modeling system may be required to predict an agent’s future actions under constraints of inadequate or contradictory relevant historical evidence. This can result in low predi...
Bark Cheung Chiu, Geoffrey I. Webb
CCS
2003
ACM
14 years 4 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
USITS
2001
14 years 4 days ago
End-to-End WAN Service Availability
Abstract--This paper seeks to understand how network failures affect the availability of service delivery across wide-area networks (WANs) and to evaluate classes of techniques for...
Bharat Chandra, Michael Dahlin, Lei Gao, Amol Naya...
VLSID
2002
IEEE
151views VLSI» more  VLSID 2002»
14 years 11 months ago
Mode Selection and Mode-Dependency Modeling for Power-Aware Embedded Systems
Among the many techniques for system-level power management, it is not currently possible to guarantee timing constraints and have a comprehensive system model at the same time. S...
Dexin Li, Pai H. Chou, Nader Bagherzadeh
TAICPART
2006
IEEE
131views Education» more  TAICPART 2006»
14 years 4 months ago
Bogor: A Flexible Framework for Creating Software Model Checkers
Model checking has proven to be an effective technology for verification and debugging in hardware and more recently in software domains. With the proliferation of multicore arch...
Robby, Matthew B. Dwyer, John Hatcliff