Sciweavers

271 search results - page 5 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
SIGOPS
2010
80views more  SIGOPS 2010»
13 years 6 months ago
Mining dependency in distributed systems through unstructured logs analysis
Dependencies among system components are crucial to locating root errors in a distributed system. In this paper, we propose an approach to mine intercomponent dependencies from un...
Jian-Guang Lou, Qiang Fu, Yi Wang, Jiang Li
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 6 days ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
WIMOB
2007
IEEE
14 years 2 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
WSC
1998
13 years 9 months ago
Risk Analysis of Robust System Design
Robustness has become a popular issue in engineering. For products, Taguchi suggests to adjust the design so that product performance is insensitive to the effects of uncontrolled...
E. G. A. Gaury, Jack P. C. Kleijnen
IOR
2008
126views more  IOR 2008»
13 years 7 months ago
Fast Simulation of Multifactor Portfolio Credit Risk
This paper develops rare event simulation methods for the estimation of portfolio credit risk -- the risk of losses to a portfolio resulting from defaults of assets in the portfol...
Paul Glasserman, Wanmo Kang, Perwez Shahabuddin