Sciweavers

177 search results - page 17 / 36
» Probabilistic Simulation-Based Analysis of Complex Real-Time...
Sort
View
67
Voted
HICSS
2005
IEEE
145views Biometrics» more  HICSS 2005»
15 years 3 months ago
Risk Assessment in Complex Interacting Infrastructure Systems
Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
David E. Newman, Bertrand Nkei, Benjamin A. Carrer...
79
Voted
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
15 years 3 months ago
Complex Interacting Infrastructure Systems
Critical infrastructures have some of the characteristic properties of complex systems. They exhibit infrequent large failures events. These events, though infrequent, often obey ...
Ian Dobson
86
Voted
CODES
2007
IEEE
15 years 3 months ago
Improved response time analysis of tasks scheduled under preemptive Round-Robin
Round-Robin scheduling is the most popular time triggered scheduling policy, and has been widely used in communication networks for the last decades. It is an efficient schedulin...
Razvan Racu, Li Li, Rafik Henia, Arne Hamann, Rolf...
ICPR
2008
IEEE
15 years 3 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
CSE
2009
IEEE
15 years 4 months ago
Modelling of Pseudonymity under Probabilistic Linkability Attacks
—This paper contributes to the field of measuring (un)linkability in communication systems; a subproblem of privacy protection. We propose an attacker state model for attacks on...
Martin Neubauer