Sciweavers

1366 search results - page 139 / 274
» Simulation Modeling and Optimization using ProModel
Sort
View
98
Voted
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
15 years 1 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
103
Voted
ICSEA
2009
IEEE
15 years 7 months ago
Testing of Image Processing Algorithms on Synthetic Data
—In this paper, it is shown that synthetic images can be used to test specific use cases of a lane tracking algorithm which has been developed by Audi AG. This was achieved by s...
Kilian von Neumann-Cosel, Erwin Roth, Daniel Lehma...
ICDCSW
2009
IEEE
15 years 7 months ago
A Dynamic Battery Model for Co-design in Cyber-Physical Systems
We introduce a dynamic battery model that describes the variations of the capacity of a battery under time varying discharge current. This model supports a co-design approach for ...
Fumin Zhang, Zhenwu Shi, Wayne Wolf
EMS
2008
IEEE
15 years 2 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
ANSS
2000
IEEE
15 years 5 months ago
Modeling and Analysis of Software Aging and Rejuvenation
Software systems are known to suffer from outages due to transient errors. Recently, the phenomenon of “software aging”, one in which the state of the software system degrades...
Kishor S. Trivedi, Kalyanaraman Vaidyanathan, Kate...