Process query systems
暂无分享,去创建一个
[1] George Cybenko,et al. Efficient computation of the hidden Markov model entropy for a given observation sequence , 2005, IEEE Transactions on Information Theory.
[2] Vincent H. Berk,et al. Process query systems for network security monitoring , 2005, SPIE Defense + Commercial Sensing.
[3] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.
[4] Kishor S. Trivedi. Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .
[5] Norbert Wiener,et al. Extrapolation, Interpolation, and Smoothing of Stationary Time Series, with Engineering Applications , 1949 .
[6] O. Patrick Kreidl,et al. Feedback control applied to survivability: a host-based autonomic defense system , 2004, IEEE Transactions on Reliability.
[7] Yong Yao,et al. The cougar approach to in-network query processing in sensor networks , 2002, SGMD.
[8] Vincent H. Berk,et al. Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems , 2005, Second International Conference on Autonomic Computing (ICAC'05).
[9] Derick Wood,et al. Data structures, algorithms, and performance , 1992 .
[10] G. Nofsinger,et al. Distributed chemical plume process detection: MILCOM 2005 #1644 , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[11] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[12] Haifeng Chen,et al. Discovering likely invariants of distributed transaction systems for autonomic system management , 2006, 2006 IEEE International Conference on Autonomic Computing.
[13] Michael Stonebraker,et al. The 8 requirements of real-time stream processing , 2005, SGMD.
[14] Samuel S. Blackman,et al. Multiple-Target Tracking with Radar Applications , 1986 .
[15] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[16] Donald F. Towsley,et al. Monitoring and early warning for internet worms , 2003, CCS '03.
[17] Alex Barsamian,et al. Target tracking and localization using infrared video imagery , 2006, SPIE Defense + Commercial Sensing.
[18] Derick Wood,et al. Theory of computation , 1986 .
[19] George Cybenko,et al. The theory of trackability with applications to sensor networks , 2008, TOSN.
[20] Donald F. Towsley,et al. Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.
[21] George Cybenko,et al. Identifying and tracking dynamic processes in social networks , 2006, SPIE Defense + Commercial Sensing.
[22] Songhwai Oh,et al. A Scalable Real-Time Multiple-Target Tracking Algorithm for Sensor Networks , 2005 .
[23] Bayesian Rcvr,et al. I I I I I I I I I , 1972 .