On the development and verification of a 2-D coupled wave-current model on unstructured meshes

A Roland, A Cucco, C Ferrarin, TW Hsu, JM Liau… - Journal of Marine …, 2009 - Elsevier
In this paper, the numerical framework for a freely available fully coupled wave-current
model, which solves the Shallow Water and the Wave Action Equation (WAE) on …

[PDF][PDF] Intrusion detection using text processing techniques with a binary-weighted cosine metric

S Rawat, VP Gulati, AK Pujari… - Journal of Information …, 2006 - cs.ucdavis.edu
This paper introduces a new similarity measure, termed Binary Weighted Cosine (BWC)
metric, for anomaly-based intrusion detection schemes that rely on using sequences of …

A comparison of input representations in neural networks: a case study in intrusion detection

Z Liu, G Florez, SM Bridges - Proceedings of the 2002 …, 2002 - ieeexplore.ieee.org
Recently intrusion detection techniques have shifted from user-based and connection-based
to process-based approach. Forrest et al.(1996) presented one or the first papers analyzing …

Server detection of client process termination

MA Huras, TJ Vincent - US Patent 6,125,401, 2000 - Google Patents
A Service provider for use in a client-Server System which is capable of detecting the
abnormal termination of a client process is disclosed. The Service provider does not require …

Lightweight monitoring of mpi programs in real time

G Florez, Z Liu, SM Bridges, A Skjellum… - Concurrency and …, 2005 - Wiley Online Library
Current technologies allow efficient data collection by several sensors to determine an
overall evaluation of the status of a cluster. However, no previous work of which we are …

[PDF][PDF] Integrating intelligent anomaly detection agents into distributed monitoring systems

G Florez-Larrahondo, Z Liu, YS Dandass… - Journal of …, 2006 - softcomputing.net
High-performance computing clusters have become critical computing resources in many
sensitive and/or economically important areas. Anomalies in such systems can be caused …

Portable inter process communication programming

M Kashyian, SL Mirtaheri… - 2008 The Second …, 2008 - ieeexplore.ieee.org
Most applications are consisted of several activities that are fulfilled by different processes.
And even processes are included different child processes named light processes or …

A novel vehicle safety traffic pre-warning decision on multi-sensor information fusion

Y Chen, C Zhang, X Huang - 2007 International Conference on …, 2007 - ieeexplore.ieee.org
Vehicle safety traffic is a hot issue today. Because the factors of pre-warning decision are
very complex, including weather, time, vehicle type, self-speed, relative speed and so on …

Wormulator: simulator for rapidly spreading Malware

J Krishnaswamy - 2009 - scholarworks.sjsu.edu
This project addresses the need for an application level simulator to simulate Internet-wide
phenomenon such as flash worms, botnets, Distributed Denial-of-Service attacks, etc. There …

[PS][PS] PC Farms at Fermilab

A Beretvas, MT Cheng, PT Chang, F Donno, J Fromm… - inspirehep.net
Fermilab is investigating the use of PC's for HEP computing. As a rst step, we have built a full
o ine environment under Linux on a set of P5 and P6 machines (the\PC Farm"). The Pythia …