Sciweavers

1742 search results - page 269 / 349
» A Framework for Network Modeling in Prolog
Sort
View
DSN
2011
IEEE
14 years 3 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
CBSE
2009
Springer
15 years 10 months ago
Integrating Functional and Architectural Views of Reactive Systems
An integrated model-based development approach has to capture the relationship between requirements, design, and implementation models. In the requirements engineering phase, the m...
Jewgenij Botaschanjan, Alexander Harhurin
AICCSA
2008
IEEE
261views Hardware» more  AICCSA 2008»
15 years 10 months ago
Measuring quality of experience for MPEG-21-based cross-layer multimedia content adaptation
The aim of this paper is to describe a Quality of Service (QoS) model enabling to measure the perceptual quality of video transmissions by exploiting metrics from different layers...
Christian Timmerer, Víctor H. Ortega, Jose ...
GLVLSI
2005
IEEE
118views VLSI» more  GLVLSI 2005»
15 years 9 months ago
A continuous time markov decision process based on-chip buffer allocation methodology
We have presented an optimal on-chip buffer allocation and buffer insertion methodology which uses stochastic models of the architecture. This methodology uses finite buffer s...
Sankalp Kallakuri, Nattawut Thepayasuwan, Alex Dob...
ISNN
2005
Springer
15 years 9 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang