Sciweavers

7544 search results - page 143 / 1509
» Network Forensics Analysis
Sort
View
143
Voted
PE
2010
Springer
133views Optimization» more  PE 2010»
15 years 1 months ago
Positive Harris recurrence and diffusion scale analysis of a push pull queueing network
We consider a push pull queueing system with two servers and two types of jobs which are processed by the two servers in opposite order, with stochastic generally distributed proc...
Yoni Nazarathy, Gideon Weiss
205
Voted
JUCS
2010
215views more  JUCS 2010»
14 years 10 months ago
A Multidisciplinary Survey of Computational Techniques for the Modelling, Simulation and Analysis of Biochemical Networks
: All processes of life are controlled by networks of interacting biochemical components. The purpose of modelling these networks is manifold. From a theoretical point of view it a...
James Decraene, Thomas Hinze
128
Voted
SUTC
2008
IEEE
15 years 9 months ago
EvAnT: Analysis and Checking of Event Traces for Wireless Sensor Networks
Testing and verification methodologies for Wireless Sensor Networks (WSN) systems in pre-deployment are vital for a successful deployment. Increased visibility of the internal st...
Matthias Woehrle, Christian Plessl, Roman Lim, Jan...
110
Voted
IPPS
2006
IEEE
15 years 9 months ago
Analysis of a reconfigurable network processor
In this paper an analysis of a dynamically reconfigurable processor is presented. The network processor incorporates a processor and a number of coprocessors that can be connected...
Christopher Kachris, Stamatis Vassiliadis
132
Voted
QOFIS
2004
Springer
15 years 8 months ago
Load Analysis of Topology-Unaware TDMA MAC Policies for Ad Hoc Networks
Medium Access Control (MAC) policies in which the scheduling time slots are allocated irrespectively of the underline topology are suitable for ad-hoc networks, where nodes can ent...
Konstantinos Oikonomou, Ioannis Stavrakakis