Sciweavers

372 search results - page 37 / 75
» Evaluating Lexical Substitution: Analysis and New Measures
Sort
View
CN
2007
80views more  CN 2007»
13 years 8 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
EURONGI
2006
Springer
13 years 11 months ago
Joint Connection and Packet Level Analysis in W-CDMA Radio Interface
Abstract. This work introduces a new analytical method for performance evaluation of wireless packet-oriented networks. Unlike traditional call admission control procedures commonl...
Vilius Benetis, Larissa Popova, Villy Bæk Iv...
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
14 years 1 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
EDCC
1999
Springer
14 years 8 days ago
Dependability Modelling and Sensitivity Analysis of Scheduled Maintenance Systems
Abstract. In this paper we present a new modelling approach for dependability evaluation and sensitivity analysis of Scheduled Maintenance Systems, based on a Deterministic and Sto...
Andrea Bondavalli, Ivan Mura, Kishor S. Trivedi
ICDT
1999
ACM
99views Database» more  ICDT 1999»
14 years 7 days ago
Increasing the Expressiveness of Analytical Performance Models for Replicated Databases
The vast number of design options in replicated databases requires efficient analytical performance evaluations so that the considerable overhead of simulations or measurements can...
Matthias Nicola, Matthias Jarke