Sciweavers

817 search results - page 119 / 164
» Malware behaviour analysis
Sort
View
COMCOM
2008
99views more  COMCOM 2008»
14 years 12 months ago
Performance implications of fluctuating server capacity
In this paper, we consider a variant of an M/M/c/c loss system with fluctuating server capacity. Given a set of primary inputs, such as arrival rate, service rate, and capacity fl...
Jingxiang Luo, Carey L. Williamson
AMC
2006
91views more  AMC 2006»
14 years 12 months ago
Lateral load estimation from visco-plastic mud-flow around cylindrical row of piles
In this paper, the influence of slow and creeping flow of mud/slurry is modelled as a visco-plastic fluid around cylindrical row of piles. The study is carried out theoretically u...
Seyhan Firat, Mehmet Saribiyik, Erkan Çeleb...
AUTOMATICA
2006
183views more  AUTOMATICA 2006»
14 years 12 months ago
Bank management via stochastic optimal control
This paper examines a problem related to the optimal risk management of banks in a stochastic dynamic setting. In particular, we minimize7 market and capital adequacy risk that in...
Janine Mukuddem-Petersen, Mark Adam Petersen
IANDC
2008
87views more  IANDC 2008»
14 years 12 months ago
Timed Petri nets and timed automata: On the discriminating power of zeno sequences
Timed Petri nets and timed automata are two standard models for the analysis of real-time systems. In this paper, we prove that they are incomparable for the timed language equival...
Patricia Bouyer, Serge Haddad, Pierre-Alain Reynie...
SIGMETRICS
2008
ACM
14 years 11 months ago
A view-probability-matrix approach to the modelling of gossiping protocols
This paper addresses the quantitative analysis of gossiping protocols. In contrast to existing approaches which are entirely based on the simulation of the individual nodes' ...
Thomas Krieger, Martin Riedl, Johann Schuster, Mar...