Sciweavers

700 search results - page 93 / 140
» et 2008
Sort
View
CONSTRAINTS
2006
70views more  CONSTRAINTS 2006»
13 years 7 months ago
Stochastic Constraint Programming: A Scenario-Based Approach
To model combinatorial decision problems involving uncertainty and probability, we introduce scenario based stochastic constraint programming. Stochastic constraint programs conta...
Armagan Tarim, Suresh Manandhar, Toby Walsh
IJBC
2008
63views more  IJBC 2008»
13 years 7 months ago
On Isoconcentration Surfaces of Three-Dimensional Turing Patterns
We consider three dimensional Turing patterns and their isoconcentration surfaces corresponding to the equilibrium concentration of the reaction kinetics. We call these surfaces eq...
Tilmann Glimm, H. George E. Hentschel
IJNSEC
2008
95views more  IJNSEC 2008»
13 years 7 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
IJSN
2008
80views more  IJSN 2008»
13 years 7 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
IPL
2008
80views more  IPL 2008»
13 years 7 months ago
A simpler competitive analysis for scheduling equal-length jobs on one machine with restarts
We consider the online problem of scheduling jobs with equal processing times on a single machine. Each job has a release time and a deadline, and the goal is to maximize the numb...
Michael H. Goldwasser, Arundhati Bagchi Misra