Sciweavers

2500 search results - page 443 / 500
» Inclusion-Exclusion and Network Reliability
Sort
View
ACSAC
1999
IEEE
14 years 1 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
IRREGULAR
1997
Springer
14 years 1 months ago
Parallel Shared-Memory State-Space Exploration in Stochastic Modeling
Stochastic modeling forms the basis for analysis in many areas, including biological and economic systems, as well as the performance and reliability modeling of computers and comm...
Susann C. Allmaier, Graham Horton
ICRA
1994
IEEE
100views Robotics» more  ICRA 1994»
14 years 1 months ago
SM2 for New Space Station Structure: Autonomous Locomotion and Teleoperation Control
The Self-Mobile Space Manipulator (SM2) has evolved to adapt to the new pre-integrated I-beam structure of the Space Station Freedom (SSF). In this paper, we first briefly overvie...
Michael C. Nechyba, Yangsheng Xu
IPMU
1992
Springer
14 years 29 days ago
Rule-Based Systems with Unreliable Conditions
This paper deals with the problem of inference under uncertain information. This is a generalization of a paper of Cardona et al. (1991a) where rules were not allowed to contain n...
L. Cardona, Jürg Kohlas, Paul-André Mo...
ASPDAC
2007
ACM
110views Hardware» more  ASPDAC 2007»
14 years 27 days ago
Fast Placement Optimization of Power Supply Pads
Power grid networks in VLSI circuits are required to provide adequate input supply to ensure reliable performance. In this paper, we propose algorithms to find the placement of pow...
Yu Zhong, Martin D. F. Wong