Sciweavers

16 search results - page 2 / 4
» Towards Quantifying the (In)Security of Networked Systems
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
77
Voted
CDC
2009
IEEE
179views Control Systems» more  CDC 2009»
15 years 2 months ago
Bayesian network approach to understand regulation of biological processes in cyanobacteria
— Bayesian networks have extensively been used in numerous fields including artificial intelligence, decision theory and control. Its ability to utilize noisy and missing data ...
Thanura R. Elvitigala, Abhay K. Singh, Himadri B. ...
PE
2010
Springer
133views Optimization» more  PE 2010»
14 years 8 months ago
Positive Harris recurrence and diffusion scale analysis of a push pull queueing network
We consider a push pull queueing system with two servers and two types of jobs which are processed by the two servers in opposite order, with stochastic generally distributed proc...
Yoni Nazarathy, Gideon Weiss
109
Voted
SIGMETRICS
1995
ACM
144views Hardware» more  SIGMETRICS 1995»
15 years 1 months ago
On Characterizing Bandwidth Requirements of Parallel Applications
Synthesizing architectural requirements from an application viewpoint can help in making important architectural design decisions towards building large scale parallel machines. I...
Anand Sivasubramaniam, Aman Singla, Umakishore Ram...
VRST
1998
ACM
15 years 1 months ago
Multi-resolution model transmission in distributed virtual environments
Distributed virtual environments allow users at di erent geographical locations to share and interact within a common virtual environment via a local network or through the Intern...
Jimmy H. P. Chim, Rynson W. H. Lau, Antonio Si, Ho...