Practical Autonomic Computing
暂无分享,去创建一个
Vincent H. Berk | George Cybenko | Ian D. Gregorio-De Souza | Chad Behre | G. Cybenko | V. Berk | Chad Behre
[1] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[2] M. W. Shields. An Introduction to Automata Theory , 1988 .
[3] Aapo Hyvärinen,et al. Survey on Independent Component Analysis , 1999 .
[4] Vincent H. Berk,et al. Process query systems , 2007, Computer.
[5] Jeffrey D. Ullman,et al. Introduction to Automata Theory, Languages and Computation , 1979 .
[6] Vincent H. Berk,et al. Process query systems for network security monitoring , 2005, SPIE Defense + Commercial Sensing.
[7] Lui Sha,et al. Real-time communication and coordination in embedded sensor networks , 2003, Proc. IEEE.
[8] Guanling Chen,et al. Solar: Towards a Flexible and Scalable Data-Fusion Infrastructure for Ubiquitous Computing , 2001 .
[9] Vincent H. Berk,et al. An overview of process query systems , 2004, SPIE Defense + Commercial Sensing.
[10] Haifeng Chen,et al. Discovering Likely Invariants of Distributed Transaction Systems for Autonomic System Management , 2006 .
[11] F. H. Adler. Cybernetics, or Control and Communication in the Animal and the Machine. , 1949 .
[12] O. Patrick Kreidl,et al. Feedback control applied to survivability: a host-based autonomic defense system , 2004, IEEE Transactions on Reliability.
[13] Jr. G. Forney,et al. The viterbi algorithm , 1973 .
[14] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[15] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[16] Risto Vaarandi,et al. A data clustering algorithm for mining patterns from event logs , 2003, Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003) (IEEE Cat. No.03EX764).
[17] C.S. Chao,et al. An Automated Fault Diagnosis System Using Hierarchical Reasoning and Alarm Correlation , 1999, Proceedings 1999 IEEE Workshop on Internet Applications (Cat. No.PR00197).
[18] Kevin P. Anchor,et al. CDIS: Towards a Computer Immune System for Detecting Network Intrusions , 2001, Recent Advances in Intrusion Detection.
[19] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[20] Guofei Jiang. Weak process models for robust process detection , 2004, SPIE Defense + Commercial Sensing.
[21] David A. Patterson,et al. Path-Based Failure and Evolution Management , 2004, NSDI.
[22] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[23] Vincent H. Berk,et al. Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems , 2005, Second International Conference on Autonomic Computing (ICAC'05).
[24] D UllmanJeffrey,et al. Introduction to automata theory, languages, and computation, 2nd edition , 2001 .
[25] Albert Benveniste,et al. Diagnosis of asynchronous discrete event systems, a net unfolding approach , 2002, Sixth International Workshop on Discrete Event Systems, 2002. Proceedings..
[26] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[27] Yong Yao,et al. The cougar approach to in-network query processing in sensor networks , 2002, SGMD.