Sciweavers

2746 search results - page 165 / 550
» Case Study in Survivable Network System Analysis
Sort
View
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 4 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
93
Voted
BMEI
2009
IEEE
14 years 11 months ago
Analysis of the Bipartite Networks of Domain Compositions and Metabolic Reactions
It is widely accepted that complexity of biological systems arises from combinations of common subunits. In this work we investigate the combinatorial patterns of protein domains ...
Chen-Hsiang Yeang
101
Voted
TFS
2008
129views more  TFS 2008»
14 years 8 months ago
A Functional-Link-Based Neurofuzzy Network for Nonlinear System Control
Abstract--This study presents a functional-link-based neurofuzzy network (FLNFN) structure for nonlinear system control. The proposed FLNFN model uses a functional link neural netw...
Cheng-Hung Chen, Cheng-Jian Lin, Chin-Teng Lin
88
Voted
ICECCS
2009
IEEE
119views Hardware» more  ICECCS 2009»
15 years 4 months ago
REMES: A Resource Model for Embedded Systems
In this paper, we introduce the model REMES for formal modeling and analysis of embedded resources such as storage, energy, communication, and computation. The model is a state-ma...
Cristina Cerschi Seceleanu, Aneta Vulgarakis, Paul...
FIW
2009
138views Communications» more  FIW 2009»
14 years 8 months ago
Considering Online Feature Interaction Detection and Resolution for Integrated Services in Home Network System
Abstract. This paper presents an online detection and resolution method for feature interactions among integrated services in home network systems. To achieve reasonable online det...
Masahide Nakamura, Hiroshi Igaki, Yuhei Yoshimura,...