Sciweavers

5 search results - page 1 / 1
» Modeling and Execution of Complex Attack Scenarios using Int...
Sort
View
IWIA
2006
IEEE
13 years 9 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
MM
1993
ACM
122views Multimedia» more  MM 1993»
13 years 7 months ago
Synchronization Models for Multimedia Presentation with User Participation
This paper addresses the key issue of providing flexible multimedia presentation with user participation and suggests synchronization models which can specify the user participat...
B. Prabhakaran, S. V. Raghavan
JSW
2007
126views more  JSW 2007»
13 years 3 months ago
Supporting UML Sequence Diagrams with a Processor Net Approach
— UML sequence diagrams focus on the interaction between different classes. For distributed real time transaction processing it is possible to end up with complex sequence diagra...
Tony Spiteri Staines
CPE
1994
Springer
170views Hardware» more  CPE 1994»
13 years 7 months ago
Automatic Scalability Analysis of Parallel Programs Based on Modeling Techniques
When implementingparallel programs forparallel computer systems the performancescalability of these programs should be tested and analyzed on different computer configurations and...
Allen D. Malony, Vassilis Mertsiotakis, Andreas Qu...
EDCC
1999
Springer
13 years 8 months ago
Dependability Modelling and Sensitivity Analysis of Scheduled Maintenance Systems
Abstract. In this paper we present a new modelling approach for dependability evaluation and sensitivity analysis of Scheduled Maintenance Systems, based on a Deterministic and Sto...
Andrea Bondavalli, Ivan Mura, Kishor S. Trivedi