Sciweavers

TRIDENTCOM
2006
IEEE
13 years 11 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
ISPASS
2006
IEEE
13 years 11 months ago
Simulation sampling with live-points
Current simulation-sampling techniques construct accurate model state for each measurement by continuously warming large microarchitectural structures (e.g., caches and the branch...
Thomas F. Wenisch, Roland E. Wunderlich, Babak Fal...
ICECCS
2006
IEEE
115views Hardware» more  ICECCS 2006»
13 years 11 months ago
A Layered Behavioural Model of Platelets
There is great interest in the application of nanotechnology to medicine, but concerns for safety are paramount. We present a modelling technique based on CSP and B as a starting ...
Steve Schneider, Helen Treharne, Ana Cavalcanti, J...
GRID
2007
Springer
13 years 11 months ago
Integrating multi-level molecular simulations across heterogeneous resources
— Biomolecular simulations play a key role in the study of complex biological processes at microscopic levels in which macromolecules such as proteins are involved. The simulatio...
Yudong Sun, Steve McKeever, Kia Balali-Mood, Mark ...
CAI
2009
Springer
13 years 11 months ago
A Backward and a Forward Simulation for Weighted Tree Automata
Two types of simulations for weighted tree automata (wta) are considered. Wta process trees and assign a weight to each of them. The weights are taken from a semiring. The two type...
Andreas Maletti