Sciweavers

5114 search results - page 773 / 1023
» Complex networks
Sort
View
114
Voted
AINA
2007
IEEE
15 years 9 months ago
OWL-Based Context-Dependent Task Modeling and Deducing
In the near future, homes are envisioned to be equipped with numerous intelligent communicating devices. Such smart home needs to exhibit highly adaptive behavior to meet the inha...
Hongbo Ni, Xingshe Zhou, Zhiwen Yu, Kejian Miao
130
Voted
DSN
2007
IEEE
15 years 9 months ago
Dynamic Fault Tree Analysis Using Input/Output Interactive Markov Chains
Dynamic Fault Trees (DFT) extend standard fault trees by allowing the modeling of complex system components’ behaviors and interactions. Being a high level model and easy to use...
Hichem Boudali, Pepijn Crouzen, Mariëlle Stoe...
113
Voted
DSN
2007
IEEE
15 years 9 months ago
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices...
Marcello Cinque, Domenico Cotroneo, Zbigniew Kalba...
98
Voted
DSN
2007
IEEE
15 years 9 months ago
Computing Battery Lifetime Distributions
The usage of mobile devices like cell phones, navigation systems, or laptop computers, is limited by the lifetime of the included batteries. This lifetime depends naturally on the...
Lucia Cloth, Marijn R. Jongerden, Boudewijn R. Hav...
128
Voted
ICC
2007
IEEE
164views Communications» more  ICC 2007»
15 years 9 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao