Sciweavers

3119 search results - page 139 / 624
» Abstract Requirement Analysis in Multiagent System Design
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
IAT
2009
IEEE
15 years 4 months ago
Towards Zero-Delay Recovery of Agents in Production Automation Systems
Multi-agent systems (MAS) is an accepted paradigm in safety-critical systems, like the production automation. Agents control the underlying machinery they are representing and int...
eva Kühn, Richard Mordinyi, Mario Lang, Adnan...
92
Voted
IWDC
2001
Springer
15 years 2 months ago
Design and Deployment of a Passive Monitoring Infrastructure
Abstract— This paper presents the architecture of a passive monitoring system installed within the Sprint IP backbone network. This system differs from other packet monitoring sy...
Chuck Fraleigh, Christophe Diot, Bryan Lyles, Sue ...
SAMOS
2009
Springer
15 years 4 months ago
Visualization of Computer Architecture Simulation Data for System-Level Design Space Exploration
System-level computer architecture simulations create large volumes of simulation data to explore alternative architectural solutions. Interpreting and drawing conclusions from thi...
Toktam Taghavi, Mark Thompson, Andy D. Pimentel
101
Voted
P2P
2010
IEEE
135views Communications» more  P2P 2010»
14 years 8 months ago
QoE in Pull Based P2P-TV Systems: Overlay Topology Design Tradeoffs
Abstract—This paper presents a systematic performance analysis of pull P2P video streaming systems for live applications, providing guidelines for the design of the overlay topol...
R. Fortuna, Emilio Leonardi, Marco Mellia, Michela...