Sciweavers

4330 search results - page 50 / 866
» Analyzing security architectures
Sort
View
DSN
2011
IEEE
12 years 7 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
WCRE
2008
IEEE
14 years 1 months ago
Analyzing the Actual Execution of a Large Software-Intensive System for Determining Dependencies
In this paper, we present a dynamic analysis approach to increase the understandability of a large softwareintensive system, more particularly to enable the identification of depe...
Trosky Boris Callo Arias, Paris Avgeriou, Pierre A...
MSE
2002
IEEE
122views Hardware» more  MSE 2002»
14 years 10 days ago
Modeling and Analyzing SMIL Documents in SAM
A composite multimedia object has specific timing relationships among the different types of component media. Coordinating the real-time presentation of information and maintaini...
Huiqun Yu, Xudong He, Shu Gao, Yi Deng
ICECCS
2008
IEEE
3385views Hardware» more  ICECCS 2008»
14 years 1 months ago
Contract-Based Approach to Analyze Software Components
Component-based software development focuses on building large software systems by integrating existing software components to reduce cost, risk and time. However, behavioural and...
Abdelhafid Zitouni, Lionel Seinturier, Mahmoud Bou...
WSC
2001
13 years 8 months ago
Hybrid agent-based simulation for analyzing the national airspace system
Hybrid agent-based simulation is required to provide a mechanism for analyzing large-scale complex systems, such as the National Airspace System (NAS). The dynamic behavior of man...
Seungman Lee, Amy R. Pritchett, David Goldsman