Sciweavers

2402 search results - page 263 / 481
» Performance Analysis of a Distributed Question Answering Sys...
Sort
View
SACMAT
2009
ACM
15 years 10 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
15 years 10 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
154
Voted
PAMI
2011
14 years 6 months ago
Meta-Recognition: The Theory and Practice of Recognition Score Analysis
Abstract—In this paper, we define meta-recognition, a performance prediction method for recognition algorithms, and examine the theoretical basis for its post-recognition score ...
Walter J. Scheirer, Anderson Rocha, Ross J. Michea...
TCOM
2010
162views more  TCOM 2010»
14 years 10 months ago
RFID Reader Receivers for Physical Layer Collision Recovery
Abstract--Arbitration and scheduling of multiple tags in stateof-the-art Radio Frequency Identification (RFID) systems is accomplished on the medium access control layer. Currently...
Christoph Angerer, Robert Langwieser, Markus Rupp
JSS
2010
142views more  JSS 2010»
14 years 10 months ago
Analysis of service availability for time-triggered rejuvenation policies
In this paper we investigate the effect of three time-triggered system rejuvenation policies on service availability using a queuing model. The model is formulated as an extended ...
Felix Salfner, Katinka Wolter