Sciweavers

5234 search results - page 788 / 1047
» Simulation of Computer Network Attacks
Sort
View
CONCURRENCY
2008
124views more  CONCURRENCY 2008»
15 years 4 months ago
A service-oriented Grid environment for integration of distributed kidney models and resources
In this paper, we present a Grid computing platform that provides experimental scientists and analysts with access to computational simulations and knowledge databases hosted in s...
Xingchen Chu, Andrew Lonie, Peter Harris, S. Randa...
PERCOM
2006
ACM
16 years 4 months ago
Analysing fundamental properties of marker-based vision system designs
This paper investigates fundamental properties of Marker-based Vision (MBV) systems. We present a theoretical analysis of the performance of basic tag designs which is extended th...
Andrew C. Rice, Robert K. Harle, Alastair R. Beres...
DSN
2007
IEEE
15 years 11 months ago
On the Quality of Service of Crash-Recovery Failure Detectors
In this paper, we study and model a crash-recovery target and its failure detector’s probabilistic behavior. We extend Quality of Service (QoS) metrics to measure the recovery d...
Tiejun Ma, Jane Hillston, Stuart Anderson
IPPS
2007
IEEE
15 years 11 months ago
Protein Secondary Structure Prediction using Bayesian Inference method on Decision fusion algorithms
Prediction of protein secondary structure (alpha-helix, beta-sheet, coil) from primary sequence of amino acids is a very challenging task, and the problem has been approached from...
Somasheker Akkaladevi, Ajay K. Katangur
NCA
2005
IEEE
15 years 10 months ago
Using Residual Times to Meet Deadlines in M/G/C Queues
In systems where customer service demands are only known probabilistically, there is very little to distinguish between jobs. Therefore, no universal optimum scheduling strategy o...
Sarah Tasneem, Lester Lipsky, Reda A. Ammar, Howar...