Sciweavers

987 search results - page 63 / 198
» Analysis of the trade-offs in different modeling approaches ...
Sort
View
WOSP
2010
ACM
14 years 3 months ago
Analytical modeling of lock-based concurrency control with arbitrary transaction data access patterns
Nowadays the 2-Phase-Locking (2PL) concurrency control algorithm still plays a core rule in the construction of transactional systems (e.g. database systems and transactional memo...
Pierangelo di Sanzo, Roberto Palmieri, Bruno Cicia...
BMCBI
2004
133views more  BMCBI 2004»
13 years 8 months ago
Evaluation of several lightweight stochastic context-free grammars for RNA secondary structure prediction
Background: RNA secondary structure prediction methods based on probabilistic modeling can be developed using stochastic context-free grammars (SCFGs). Such methods can readily co...
Robin D. Dowell, Sean R. Eddy
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
IAT
2006
IEEE
14 years 3 months ago
Goal-Oriented Development of BDI Agents: The PRACTIONIST Approach
The representation of goals and the ability to reason about them play an important role in goal-oriented requirements analysis and modelling techniques, especially in agent-orient...
Vito Morreale, Susanna Bonura, Giuseppe Francavigl...
APSEC
2000
IEEE
14 years 1 months ago
Survivability Analysis of Networked Systems
Survivability is the ability of a system to continue operating despite the presence of abnormal events such as failures and intrusions. Ensuring system survivability has increased...
Jeannette M. Wing