Sciweavers

1512 search results - page 262 / 303
» connection 2006
Sort
View
PE
2006
Springer
107views Optimization» more  PE 2006»
14 years 11 months ago
Efficient steady-state analysis of second-order fluid stochastic Petri nets
This paper presents an efficient solution technique for the steady-state analysis of the second-order Stochastic Fluid Model underlying a second-order Fluid Stochastic Petri Net (...
Marco Gribaudo, Rossano Gaeta
ESWA
2008
166views more  ESWA 2008»
14 years 11 months ago
Modular design to support green life-cycle engineering
The severe competition in the market has driven enterprises to produce a wider variety of products to meet consumers' needs. However, frequent variation of product specificat...
Hwai-En Tseng, Chien-Chen Chang, Jia-Diann Li
TMC
2010
137views more  TMC 2010»
14 years 6 months ago
Unwanted Link Layer Traffic in Large IEEE 802.11 Wireless Networks
Wireless networks have evolved into an important technology for connecting users to the Internet. As the utility of wireless technology grows, wireless networks are being deployed ...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
WWW
2006
ACM
16 years 14 days ago
Analysis of WWW traffic in Cambodia and Ghana
In this paper we present an analysis of HTTP traffic captured from Internet caf?es and kiosks from two different developing countries ? Cambodia and Ghana. This paper has two main...
Bowei Du, Michael J. Demmer, Eric A. Brewer
CCS
2006
ACM
15 years 3 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen