Sciweavers

363 search results - page 31 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
ICC
2000
IEEE
15 years 2 months ago
A Framework for the Analysis of Adaptive Voice over IP
— In this paper, we present a framework for the analysis of a set of adaptive variable-bit-rate voice sources in a packet network. The instantaneous bit rate of each source is de...
Claudio Casetti, J. C. De Martin, Michela Meo
SIGDIAL
2010
14 years 7 months ago
Cooperative User Models in Statistical Dialog Simulators
Statistical user simulation is a promising methodology to train and evaluate the performance of (spoken) dialog systems. We work with a modular architecture for data-driven simula...
Meritxell González, Silvia Quarteroni, Gius...
95
Voted
GI
2003
Springer
15 years 2 months ago
Byzantine Failures and Security: Arbitrary is not (always) Random
: The Byzantine failure model allows arbitrary behavior of a certain fraction of network nodes in a distributed system. It was introduced to model and analyze the effects of very s...
Felix C. Gärtner
DFT
2005
IEEE
72views VLSI» more  DFT 2005»
15 years 3 months ago
Soft Error Modeling and Protection for Sequential Elements
Sequential elements, flip-flops, latches, and memory cells, are the most vulnerable components to soft errors. Since state-of-the-art designs contain millions of bistables, it i...
Hossein Asadi, Mehdi Baradaran Tahoori
80
Voted
APSCC
2006
IEEE
14 years 11 months ago
GHIDS: Defending Computational Grids against Misusing of Shared Resources
Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional Host-based Intrusion Detecting System (HIDS) is not suitable for grid environme...
Guofu Feng, Xiaoshe Dong, Weizhe Liu, Ying Chu, Ju...