Sciweavers

1886 search results - page 115 / 378
» Verifying and Validating Simulation Models
Sort
View
DATE
2003
IEEE
76views Hardware» more  DATE 2003»
15 years 3 months ago
Modeling and Evaluation of Substrate Noise Induced by Interconnects
Interconnects have deserved attention as a source of crosstalk to other interconnects, but have been ignored as a source of substrate noise. In this paper, we evaluate the importa...
Ferran Martorell, Diego Mateo, Xavier Aragon&egrav...
CCS
2010
ACM
15 years 4 months ago
Cryptographic role-based security mechanisms based on role-key hierarchy
Even though role-based access control (RBAC) can tremendously help us minimize the complexity in administering users, it is still needed to realize the notion of roles at the reso...
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang
AAAI
2007
15 years 7 days ago
Reasoning about Attribute Authenticity in a Web Environment
The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. How...
Thomas Wölfl
CCECE
2006
IEEE
15 years 4 months ago
Analytical Modeling of Interference in Cellular Fixed Relay Networks
We develop a simple yet accurate analysis of the interference distribution in a cellular system, with particular emphasis on a two-hop fixed relay network, though the analysis may...
Sebastian S. Szyszkowicz, Halim Yanikomeroglu, Ema...
WSC
1997
14 years 11 months ago
Covalidation of Dissimilarly Structured Models
A methodology is presented which allows comparison between models under different modeling paradigms. Consider the following situation: Two models have been constructed to study d...
Samuel A. Wright, Kenneth W. Bauer Jr.