Sciweavers

883 search results - page 89 / 177
» Applying Sensitivity Analysis in Real-Time Distributed Syste...
Sort
View
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 10 months ago
Performance Evaluation of DCA and SRC on a Single Bot Detection
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
CDC
2009
IEEE
104views Control Systems» more  CDC 2009»
14 years 3 months ago
Moment-based analysis of synchronization in small-world networks of oscillators
— In this paper, we investigate synchronization in a small-world network of coupled nonlinear oscillators. This network is constructed by introducing random shortcuts in a neares...
Victor M. Preciado, Ali Jadbabaie
EMSOFT
2007
Springer
14 years 4 months ago
WCET estimation for executables in the presence of data caches
This paper describes techniques to estimate the worst case execution time of executable code on architectures with data caches. The underlying mechanism is Abstract Interpretation...
Rathijit Sen, Y. N. Srikant
EDBT
2012
ACM
246views Database» more  EDBT 2012»
12 years 24 days ago
"Cut me some slack": latency-aware live migration for databases
Cloud-based data management platforms often employ multitenant databases, where service providers achieve economies of scale by consolidating multiple tenants on shared servers. I...
Sean Kenneth Barker, Yun Chi, Hyun Jin Moon, Hakan...
IEEEARES
2009
IEEE
13 years 8 months ago
Quantitative Analysis of Secure Information Flow via Probabilistic Semantics
We present an automatic analyzer for measuring information flow within software systems. In this paper, we quantify leakage in terms of information theory and incorporate this comp...
Chunyan Mu, David Clark