Sciweavers

632 search results - page 97 / 127
» Updating with incomplete observations
Sort
View
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
AMDO
2004
Springer
14 years 29 days ago
Variant Design in Immersive Virtual Reality: A Markup Language for Scalable CSG Parts
In many product areas, a growing trend can be observed towards variant design, i.e. the development of customized designs based on variations of mature product models. We have deve...
Peter Biermann, Bernhard Jung
RAID
2004
Springer
14 years 27 days ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
DATE
2010
IEEE
121views Hardware» more  DATE 2010»
14 years 20 days ago
Properties of and improvements to time-domain dynamic thermal analysis algorithms
—Temperature has a strong influence on integrated circuit (IC) performance, power consumption, and reliability. However, accurate thermal analysis can impose high computation co...
Xi Chen, Robert P. Dick, Li Shang
PG
2002
IEEE
14 years 14 days ago
Roadmap-Based Flocking for Complex Environments
Flocking behavior is very common in nature, and there have been ongoing research efforts to simulate such behavior in computer animations and robotics applications. Generally, suc...
O. Burçhan Bayazit, Jyh-Ming Lien, Nancy M....