Page 1

Displaying 1 – 17 of 17

Showing per page

Classification Trees as a Technique for Creating Anomaly-Based Intrusion Detection Systems

Jecheva, Veselina, Nikolova, Evgeniya (2009)

Serdica Journal of Computing

Intrusion detection is a critical component of security information systems. The intrusion detection process attempts to detect malicious attacks by examining various data collected during processes on the protected system. This paper examines the anomaly-based intrusion detection based on sequences of system calls. The point is to construct a model that describes normal or acceptable system activity using the classification trees approach. The created database is utilized as a basis for distinguishing...

Combination of mobile agent and evolutionary algorithm to optimize the client transport services

Hayfa Zgaya, Slim Hammadi, Khaled Ghédira (2008)

RAIRO - Operations Research

This paper presents a migration strategy for a set of mobile agents (MAs) in order to satisfy customers' requests in a transport network, through a multimodal information system. In this context, we propose an optimization solution which operates on two levels. The first one aims to constitute a set of MAs building their routes, called Workplans. At this level, Workplans must incorporate all nodes, representing information providers in the multimodal network, in order to explore it completely....

Computational schemes for two exponential servers where the first has a finite buffer

Moshe Haviv, Rita Zlotnikov (2011)

RAIRO - Operations Research - Recherche Opérationnelle

We consider a system consisting of two not necessarily identical exponential servers having a common Poisson arrival process. Upon arrival, customers inspect the first queue and join it if it is shorter than some threshold n. Otherwise, they join the second queue. This model was dealt with, among others, by Altman et al. [Stochastic Models20 (2004) 149–172]. We first derive an explicit expression for the Laplace-Stieltjes transform of the distribution underlying the arrival (renewal) process to...

Computational schemes for two exponential servers where the first has a finite buffer

Moshe Haviv, Rita Zlotnikov (2011)

RAIRO - Operations Research

We consider a system consisting of two not necessarily identical exponential servers having a common Poisson arrival process. Upon arrival, customers inspect the first queue and join it if it is shorter than some threshold n. Otherwise, they join the second queue. This model was dealt with, among others, by Altman et al. [Stochastic Models20 (2004) 149–172]. We first derive an explicit expression for the Laplace-Stieltjes transform of the distribution underlying the arrival (renewal) process to...

Cutwidth of iterated caterpillars

Lan Lin, Yixun Lin (2013)

RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications

The cutwidth is an important graph-invariant in circuit layout designs. The cutwidth of a graph G is the minimum value of the maximum number of overlap edges when G is embedded into a line. A caterpillar is a tree which yields a path when all its leaves are removed. An iterated caterpillar is a tree which yields a caterpillar when all its leaves are removed. In this paper we present an exact formula for the cutwidth of the iterated caterpillars.

Cutwidth of the r-dimensional Mesh of d-ary Trees

Imrich Vrťo (2010)

RAIRO - Theoretical Informatics and Applications

We prove that the cutwidth of the r-dimensional mesh of d-ary trees is of order Θ ( d ( r - 1 ) n + 1 ) , which improves and generalizes previous results.

Currently displaying 1 – 17 of 17

Page 1