Sciweavers

3104 search results - page 231 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
HT
2000
ACM
15 years 9 months ago
Finding linking opportunities through relationship-based analysis
Many techniques exist for analyzing information domains in preparation for systems design. No systematic technique exists, however, for analyzing a system or domain in terms of it...
Joonhee Yoo, Michael Bieber
DOLAP
2000
ACM
15 years 9 months ago
Analyzing Clickstreams Using Subsessions
Analyzing data obtained from web server logs, so-called “clickstreams”, is rapidly becoming one of the most important activities for companies in any sector as most businesses...
Jesper Andersen, Anders Giversen, Allan H. Jensen,...
ICECCS
2005
IEEE
136views Hardware» more  ICECCS 2005»
15 years 10 months ago
Model-Based Design and Analysis of Permission-Based Security
To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems’ resources. These permissions rely on certai...
Jan Jürjens, Markus Lehrhuber, Guido Wimmel
120
Voted
RTSS
2008
IEEE
15 years 11 months ago
Control-Driven Tasks: Modeling and Analysis
The standard design of control systems is based on the periodic sampling. Every period the data is read from the input, the control law is computed, and the output is written to t...
Manel Velasco, Pau Martí, Enrico Bini
188
Voted
ICC
2011
IEEE
206views Communications» more  ICC 2011»
14 years 4 months ago
A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet
—Anonymity is one of the main motivations for conducting denial-of-service attacks. Currently, there is no mechanism to either identify the true source of an IP packet or to prov...
Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C...