Sciweavers

8377 search results - page 144 / 1676
» Scenarios - Introduction
Sort
View
IPOM
2009
Springer
15 years 9 months ago
An IPSec Mediation Approach for Safe Establishment of Inter-domain VPNs
In this paper we propose a new solution to increase the security of BGP/MPLS IP VPNs established across multiple domains. In general, layer 3 VPNs already present a number of secur...
Alexandre Matos, Fernando Matos, Paulo Simõ...
ECRTS
2000
IEEE
15 years 8 months ago
Worst-case execution times analysis of MPEG-2 decoding
This work presents the first worst-case execution times (WCET) analysis of MPEG-decoding. Solutions for two scenarios (Video-on-Demand (VoD), live) are presented, serving as exam...
Peter Altenbernd, Lars-Olof Burchard, Friedhelm St...
TIME
1998
IEEE
15 years 8 months ago
Tackling the Qualification Problem using Fluent Dependency Constraints: Preliminary Report
The use of causal rules or fluent dependency constraints has proven to provide a versatile means of dealing with the ramification problem. In this paper we show how fluent depende...
Patrick Doherty, Jonas Kvarnström
166
Voted
COMPENG
2010
265views Algorithms» more  COMPENG 2010»
15 years 8 months ago
Ontological Framework to Model Critical Infrastructures and their Interdependencies
This paper presents a Knowledge Base System (KBS) as a key component of a federated simulation framework which allows the investigation of (inter)dependencies among Critical Infra...
Elisa Castorini, Paolo Palazzari, Alberto Tofani, ...
FAABS
2004
Springer
15 years 8 months ago
Formal Consistency Verification of Deliberative Agents with Respect to Communication Protocols
The aim of this paper is to show a method that is able to detect inconsistencies in the reasoning carried out by a deliberative agent. The agent is supposed to be provided with a h...
Jaime Ramírez, Angélica de Antonio