Sciweavers

305 search results - page 20 / 61
» A model for quantitative evaluation of an end-to-end questio...
Sort
View
SRDS
2007
IEEE
14 years 2 months ago
Framework for Intrusion Tolerant Certification Authority System Evaluation
Various intrusion tolerant certification authority (CA) systems have been recently proposed to provide attack resistant certificate update/query services. However, it is difficult...
Jingqiang Lin, Jiwu Jing, Peng Liu
ANTSW
2010
Springer
13 years 6 months ago
Evaluating the Robustness of Activator-Inhibitor Models for Cluster Head Computation
Activator-inhibitor models have been widely used to explain several morphogenetic processes. They have also been used to engineer algorithms for computer graphics, distributed syst...
Lidia Yamamoto, Daniele Miorandi
QEST
2008
IEEE
14 years 3 months ago
A Parallel and Distributed Analysis Pipeline for Performance Tree Evaluation
Performance Trees are a unifying framework for the specification of performance queries involving measures and requirements. This paper describes an evaluation environment for Pe...
Darren K. Brien, Nicholas J. Dingle, William J. Kn...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 2 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
ISCAS
2007
IEEE
101views Hardware» more  ISCAS 2007»
14 years 2 months ago
Automated HDL Generation: Comparative Evaluation
— Reconfigurable computing (RC) systems, coupling general purpose processor with reconfigurable components, offer a lot of advantages. Nevertheless, currently a designer needs ...
Yana Yankova, Koen Bertels, Stamatis Vassiliadis, ...