Sciweavers

759 search results - page 120 / 152
» Identifying Modeling Errors in Signatures by Model Checking
Sort
View
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
13 years 6 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
IMC
2006
ACM
14 years 2 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
ASPLOS
2012
ACM
12 years 4 months ago
DejaVu: accelerating resource allocation in virtualized environments
Effective resource management of virtualized environments is a challenging task. State-of-the-art management systems either rely on analytical models or evaluate resource allocati...
Nedeljko Vasic, Dejan M. Novakovic, Svetozar Miuci...
ICCAD
2004
IEEE
88views Hardware» more  ICCAD 2004»
14 years 5 months ago
Diagnosis of small-signal parameters for broadband amplifiers through S-parameter measurements and sensitivity-guided evolutiona
Kth increasing uncertainties in the modeling and pmcessing of semiconductor devices, it is essential that the sources of failures be identified once the devices ure manufactured I...
Fang Liu, Sule Ozev, Martin A. Brooke
ICRA
2008
IEEE
118views Robotics» more  ICRA 2008»
14 years 3 months ago
HLS parameter estimation for multi-input multi-output systems
Abstract— In order to reduce computational burden of identification methods for multivariable systems, a hierarchical least squares (HLS) algorithm is developed. The basic idea ...
Ping Yuan, Feng Ding, Peter X. Liu