Sciweavers

1036 search results - page 57 / 208
» Utilizing Validation Experience for System Validation
Sort
View
DSS
2007
75views more  DSS 2007»
13 years 8 months ago
Short Term and Total Life Impact analysis of email worms in computer systems
This paper develops a methodology for analyzing and predicting the impact category of malicious code, particularly email worms. The current paper develops two frameworks to classi...
Insu Park, Raj Sharman, H. Raghav Rao, Shambhu J. ...
ICRA
2005
IEEE
110views Robotics» more  ICRA 2005»
14 years 1 months ago
Backstepping and Sliding-mode Techniques Applied to an Indoor Micro Quadrotor
Abstract— The latest technological progress in sensors, actuators and energy storage devices enables the developments of miniature VTOL1 systems. In this paper we present the res...
Samir Bouabdallah, Roland Siegwart
CONTEXT
1999
Springer
14 years 8 days ago
Ecological Interfaces: Extending the Pointing Paradigm by Visual Context
Following the ecological approach to visual perception, this paper presents an innovative framework for the design of multimodal systems. The proposal emphasises the role of the vi...
Antonella De Angeli, Laurent Romary, Frederic Wolf...
TACAS
1997
Springer
197views Algorithms» more  TACAS 1997»
14 years 4 days ago
Design/CPN - A Computer Tool for Coloured Petri Nets
In this paper, we describe the computer tool Design CPN supporting editing, simulation, and state space analysis of Coloured Petri Nets. So far, approximately 40 man-years have bee...
Søren Christensen, Jens Bæk Jø...
ACSAC
2001
IEEE
13 years 11 months ago
Mining Alarm Clusters to Improve Alarm Handling Efficiency
It is a well-known problem that intrusion detection systems overload their human operators by triggering thousands of alarms per day. As a matter of fact, we have been asked by on...
Klaus Julisch