Sciweavers

423 search results - page 38 / 85
» An Iterative Method to Design Traffic Flow Models
Sort
View
WORDS
2005
IEEE
15 years 5 months ago
Towards a Flow Analysis for Embedded System C Programs
Reliable program Worst-Case Execution Time (WCET) estimates are a key component when designing and verifying real-time systems. One way to derive such estimates is by static WCET ...
Jan Gustafsson, Andreas Ermedahl, Björn Lispe...
ICWE
2003
Springer
15 years 5 months ago
A Design Toolkit for Hypermedia Applications
The development process of hypermedia applications involves a variety of users with different levels of knowledge and skills. In order to get a good communication among participa...
Susana Montero, Paloma Díaz, Ignacio Aedo
RAID
2004
Springer
15 years 5 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
STOC
2002
ACM
111views Algorithms» more  STOC 2002»
16 years 2 days ago
The price of anarchy is independent of the network topology
We study the degradation in network performance caused by the selfish behavior of noncooperative network users. We consider a model of selfish routing in which the latency experie...
Tim Roughgarden
WSC
2000
15 years 1 months ago
Using simulation to evaluate cargo ship design on the LPD17 program
As part of the design of the next generation Naval Amphibious Transport Dock Ship (LPD17), simulation was used to evaluate the arrangement and flow of cargo on the ship and to int...
Joseph Hugan