Sciweavers

1336 search results - page 140 / 268
» Modelling and Analysis of PKI-Based Systems Using Process Ca...
Sort
View
147
Voted
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
15 years 3 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
115
Voted
ISCAS
2006
IEEE
121views Hardware» more  ISCAS 2006»
15 years 9 months ago
Microelectromechanical systems in 3D SOI-CMOS: sensing electronics embedded in mechanical structures
— We discuss the design of CMOS MEMS in a 3D SOI-CMOS technology. We present layout architectures, preliminary mechanics modeling using finite element analysis and release proce...
Francisco Tejada, Andreas G. Andreou
164
Voted
VMCAI
2010
Springer
16 years 1 months ago
Advances in Probabilistic Model Checking
In the recent years, there have been a large amount of investigations on safety verification of uncertain continuous systems. In engineering and applied mathematics, this verificat...
Joost-Pieter Katoen
138
Voted
WS
2010
ACM
15 years 2 months ago
Semantic web enabled software analysis
One of the most important decisions researchers face when analyzing software systems is the choice of a proper data analysis/exchange format. In this paper, we present EvoOnt, a s...
Jonas Tappolet, Christoph Kiefer, Abraham Bernstei...
143
Voted
ICPPW
2003
IEEE
15 years 9 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao