Sciweavers

CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 11 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 11 months ago
A General Framework for Graph Sparsification
Given a weighted graph G and an error parameter > 0, the graph sparsification problem requires sampling edges in G and giving the sampled edges appropriate weights to obtain a...
Ramesh Hariharan, Debmalya Panigrahi
CORR
2010
Springer
58views Education» more  CORR 2010»
13 years 11 months ago
On two variations of identifying codes
Identifying codes have been introduced in 1998 to model fault-detection in multiprocessor systems. In this paper, we introduce two variations of identifying codes: weak codes and ...
Olivier Delmas, Sylvain Gravier, Mickaël Mont...
CORR
2010
Springer
101views Education» more  CORR 2010»
13 years 11 months ago
Finite Optimal Control for Time-Bounded Reachability in CTMDPs and Continuous-Time Markov Games
We establish the existence of optimal scheduling strategies for time-bounded reachability in continuous-time Markov decision processes, and of co-optimal strategies for continuous-...
Markus Rabe, Sven Schewe
CORR
2010
Springer
89views Education» more  CORR 2010»
13 years 11 months ago
An Oracle Strongly Separating Deterministic Time from Nondeterministic Time, via Kolmogorov Complexity
Hartmanis used Kolmogorov complexity to provide an alternate proof of the classical result of Baker, Gill, and Solovay that there is an oracle relative to which P is not NP. We re...
David Doty
CORR
2010
Springer
66views Education» more  CORR 2010»
13 years 11 months ago
Price Trackers Inspired by Immune Memory
Abstract. In this paper we outline initial concepts for an immune inspired algorithm to evaluate price time series data. The proposed solution evolves a short term pool of trackers...
William O. Wilson, Phil Birkin, Uwe Aickelin
CORR
2010
Springer
65views Education» more  CORR 2010»
13 years 11 months ago
Modelling Immunological Memory
Simon Garret, Martin Robbins, Joanne Walker, Willi...
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 11 months ago
Performance Evaluation of DCA and SRC on a Single Bot Detection
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
CORR
2010
Springer
109views Education» more  CORR 2010»
13 years 11 months ago
Oil Price Trackers Inspired by Immune Memory
We outline initial concepts for an immune inspired algorithm to evaluate and predict oil price time series data. The proposed solution evolves a short term pool of trackers dynami...
William O. Wilson, Phil Birkin, Uwe Aickelin
CORR
2010
Springer
134views Education» more  CORR 2010»
13 years 11 months ago
Where is Randomness Needed to Break the Square-Root Bottleneck?
As shown by Tropp, 2008, for the concatenation of two orthonormal bases (ONBs), breaking the square-root bottleneck in compressed sensing does not require randomization over all th...
Patrick Kuppinger, Giuseppe Durisi, Helmut Bö...