Sciweavers

2746 search results - page 169 / 550
» Case Study in Survivable Network System Analysis
Sort
View
88
Voted
CAISE
2009
Springer
15 years 4 months ago
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects
In CAiSE 2006, we had presented a framework to support development of secure information systems. The framework was based on the integration of two security-aware approaches, the S...
Haralambos Mouratidis, Ali Sunyaev, Jan Jürje...
87
Voted
DRM
2003
Springer
15 years 3 months ago
Analysis of security vulnerabilities in the movie production and distribution process
Unauthorized copying of movies is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some t...
Simon Byers, Lorrie Faith Cranor, David P. Kormann...
75
Voted
CODES
2006
IEEE
15 years 4 months ago
TLM/network design space exploration for networked embedded systems
This paper presents a methodology to combine Transaction Level Modeling and System/Network co-simulation for the design of networked embedded systems. As a result, a new design di...
Nicola Bombieri, Franco Fummi, Davide Quaglia
86
Voted
ICARCV
2008
IEEE
151views Robotics» more  ICARCV 2008»
15 years 4 months ago
Model-Based Networked Control System stability based on packet drop distributions
Abstract—This paper studies the system stability of a ModelBased Networked Control System in the cases where packet losses follow a certain distributions. In this study, the unre...
Lanzhi Teng, Peng Wen, Wei Xiang
SIGMETRICS
2011
ACM
140views Hardware» more  SIGMETRICS 2011»
14 years 1 months ago
On the stability and optimality of universal swarms
Recent work on BitTorrent swarms has demonstrated that a bandwidth bottleneck at the seed can lead to the underutilization of the aggregate swarm capacity. Bandwidth underutilizat...
Xia Zhou, Stratis Ioannidis, Laurent Massouli&eacu...