Sciweavers

271 search results - page 31 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
SEKE
2005
Springer
14 years 1 months ago
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution
Most design recovery approaches start from analysing source code. Nonetheless, it is very difficult to get adequate design information only depending on source code. Additional av...
Shaoyun Li, Feng Chen, Zhihong Liang, Hongji Yang
ICC
2007
IEEE
111views Communications» more  ICC 2007»
14 years 2 months ago
Exact Multiple Access Analysis for Pulsed DS-UWB Systems with Episodic Transmission in Flat Nakagami Fading
— Exact bit error probabilities (BEP) are derived in closed form for pulsed binary direct sequence ultra-wideband (DS-UWB) multiple access systems in flat Nakagami fading channe...
Mohammad Azizur Rahman, Shigenobu Sasaki, Hisakazu...
SIGCOMM
1994
ACM
13 years 12 months ago
Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines
This paper discusses congestion control from a game-theoretic perspective. There are two basic premises: (1) users are assumed to be independent and sel sh, and (2) central admini...
Scott Shenker
CCS
2008
ACM
13 years 9 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
EGOV
2011
Springer
12 years 7 months ago
On the Relevance of Enterprise Architecture and IT Governance for Digital Preservation
Digital Preservation has been recognized as a key challenge in providing trusted information and sustainable eGovernment services. However, there has been little convergence on ali...
Christoph Becker, José Barateiro, Gon&ccedi...