Sciweavers

219 search results - page 30 / 44
» Computational Approaches to Reachability Analysis of Stochas...
Sort
View
PE
2006
Springer
130views Optimization» more  PE 2006»
13 years 7 months ago
Analysis of resource transfers in peer-to-peer file sharing applications using fluid models
This paper proposes a stochastic fluid flow model to compute the transfer time distribution of resources in peer-to-peer file sharing applications. The amount of bytes transferred...
Rossano Gaeta, Marco Gribaudo, Daniele Manini, Mat...
EDCC
1999
Springer
13 years 12 months ago
Dependability Modelling and Sensitivity Analysis of Scheduled Maintenance Systems
Abstract. In this paper we present a new modelling approach for dependability evaluation and sensitivity analysis of Scheduled Maintenance Systems, based on a Deterministic and Sto...
Andrea Bondavalli, Ivan Mura, Kishor S. Trivedi
CCGRID
2003
IEEE
14 years 26 days ago
Creating Services with Hard Guarantees from Cycle-Harvesting Systems
Abstract— Cycle-harvesting software on commodity computers is available from a number of companies and a significant part of the Grid computing landscape. However, creating comm...
Chris Kenyon, Giorgos Cheliotis
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
14 years 1 months ago
Decision Support in Health Care via Root Evidence Sampling
— Bayesian networks play a key role in decision support within health care. Physicians rely on Bayesian networks to give medical treatment, generate what-if scenarios, and other ...
Benjamin B. Perry, Eli Faulkner
SACMAT
2009
ACM
14 years 2 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri