Sciweavers

13180 search results - page 2485 / 2636
» Network Models
Sort
View
152
Voted
DATE
2010
IEEE
154views Hardware» more  DATE 2010»
15 years 4 months ago
Computing robustness of FlexRay schedules to uncertainties in design parameters
Abstract--In the current environment of rapidly changing invehicle requirements and ever-increasing functional content for automotive EE systems, there are several sources of uncer...
Arkadeb Ghosal, Haibo Zeng, Marco Di Natale, Yakov...
122
Voted
ESWS
2010
Springer
15 years 4 months ago
OKBook: Peer-to-Peer Community Formation
Many systems exist for community formation in extensions of traditional Web environments but little work has been done for forming and maintaining communities in the more dynamic e...
Xi Bai, Wamberto Vasconcelos, Dave Robertson
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 4 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
131
Voted
HPDC
2010
IEEE
15 years 4 months ago
Efficient querying of distributed provenance stores
Current projects that automate the collection of provenance information use a centralized architecture for managing the resulting metadata - that is, provenance is gathered at rem...
Ashish Gehani, Minyoung Kim, Tanu Malik
119
Voted
GLOBECOM
2008
IEEE
15 years 3 months ago
Analysis of Load-Balanced Switch with Finite Buffers
Recently the Birkhoff-von Neumann load-balanced (LB) switch has become a promising switch design due to its high scalability properties and simple control. The performance of the L...
Yury Audzevich, Yoram Ofek, Miklós Telek, B...
« Prev « First page 2485 / 2636 Last » Next »