Sciweavers

1938 search results - page 253 / 388
» Dependable Software
Sort
View
FCCM
2008
IEEE
205views VLSI» more  FCCM 2008»
14 years 3 months ago
Credit Risk Modelling using Hardware Accelerated Monte-Carlo Simulation
The recent turmoil in global credit markets has demonstrated the need for advanced modelling of credit risk, which can take into account the effects of changing economic condition...
David B. Thomas, Wayne Luk
ISPASS
2008
IEEE
14 years 3 months ago
Conservative vs. Optimistic Parallelization of Stateful Network Intrusion Detection
This paper presents and experimentally evaluates two parallelization strategies for the popular open-source Snort network intrusion detection system (NIDS). Snort identifies intr...
Derek L. Schuff, Yung Ryn Choe, Vijay S. Pai
CODES
2007
IEEE
14 years 3 months ago
On the impact of manufacturing process variations on the lifetime of sensor networks
As an emerging technology, sensor networks provide the ability to accurately monitor the characteristics of wide geographical areas over long periods of time. The lifetime of indi...
Siddharth Garg, Diana Marculescu
CODES
2007
IEEE
14 years 3 months ago
Improved response time analysis of tasks scheduled under preemptive Round-Robin
Round-Robin scheduling is the most popular time triggered scheduling policy, and has been widely used in communication networks for the last decades. It is an efficient schedulin...
Razvan Racu, Li Li, Rafik Henia, Arne Hamann, Rolf...
COMPSAC
2007
IEEE
14 years 3 months ago
A Service Discovery Architecture based on Anycast in Pervasive Computing Environments
Service discovery is very useful in pervasive computing environments. A service discovery architecture based on anycast is proposed. A wellknown anycast address is defined first, ...
Li Zhang, Zhen-lian Shi, Qi Shen