Sciweavers

2979 search results - page 445 / 596
» Modelling secure multiagent systems
Sort
View
130
Voted
WOSP
2004
ACM
15 years 9 months ago
Software performance modelling using PEPA nets
Modelling and analysing distributed and mobile software systems is a challenging task. PEPA nets—coloured stochastic Petri nets—are a recently introduced modelling formalism w...
Stephen Gilmore, Jane Hillston, Leïla Kloul, ...
135
Voted
TDSC
2010
146views more  TDSC 2010»
14 years 10 months ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
136
Voted
EUSFLAT
2009
152views Fuzzy Logic» more  EUSFLAT 2009»
15 years 1 months ago
Fuzzy and PSO Based Algorithm for Driver's Behavior Modeling
The study of human behavior during driving is of primary importance for the improvement of drivers' security. This study is complex because of numerous situations in which the...
Sohrab Khanmohammadi, Mohammad Ali Tinati, Sehrane...
106
Voted
SIGMETRICS
2008
ACM
15 years 3 months ago
A Diophantine model of routes in structured P2P overlays
Abstract-- An important intrinsic property of any structured Peer-to-Peer (P2P) overlay is multi-hop paths. Understanding their structure helps to solve challenging problems relate...
Dmitry Korzun, Andrei Gurtov
121
Voted
HICSS
2009
IEEE
124views Biometrics» more  HICSS 2009»
15 years 10 months ago
Case Studies of an Insider Framework
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...