Sciweavers

19 search results - page 4 / 4
» DEEM: A Tool for the Dependability Modeling and Evaluation o...
Sort
View
TOMACS
1998
140views more  TOMACS 1998»
13 years 4 months ago
Technical Note: A Hierarchical Computer Architecture Design and Simulation Environment
architectures at multiple levels of abstraction, encompassing both hardware and software. It has five modes of operation (Design, Model Validation, Build Simulation, Simulate Syste...
Paul S. Coe, Fred W. Howell, Roland N. Ibbett, Lau...
ETFA
2006
IEEE
13 years 8 months ago
Verification of The Minimum Cost Forwarding Protocol for Wireless Sensor Networks
Wireless sensor networks (WSN) consist of small self-contained devices with computational, sensing and wireless communication capabilities. They allow flexible, powerful, tetherles...
William D. Henderson, Steven Tron
ICST
2009
IEEE
13 years 11 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
FAST
2010
13 years 7 months ago
BASIL: Automated IO Load Balancing Across Storage Devices
Live migration of virtual hard disks between storage arrays has long been possible. However, there is a dearth of online tools to perform automated virtual disk placement and IO l...
Ajay Gulati, Chethan Kumar, Irfan Ahmad, Karan Kum...