Sciweavers

7619 search results - page 1418 / 1524
» Interaction, observance or both
Sort
View
TR
2010
159views Hardware» more  TR 2010»
13 years 4 months ago
Accelerated Degradation Tests Applied to Software Aging Experiments
Abstract--In the past ten years, the software aging phenomenon has been systematically researched, and recognized by both academic, and industry communities as an important obstacl...
Rivalino Matias, Pedro Alberto Barbetta, Kishor S....
TSMC
2010
13 years 4 months ago
State-Feedback Control of Fuzzy Discrete-Event Systems
In a 2002 paper, we combined fuzzy logic with discrete-event systems (DESs) and established an automaton model of fuzzy DESs (FDESs). The model can effectively represent determinis...
Feng Lin, Hao Ying
CORR
2011
Springer
206views Education» more  CORR 2011»
13 years 1 months ago
Modeling and Analysis of K-Tier Downlink Heterogeneous Cellular Networks
Cellular networks are in a major transition from a carefully planned set of large tower-mounted basestations (BSs) to an irregular deployment of heterogeneous infrastructure eleme...
Harpreet S. Dhillon, Radha Krishna Ganti, Fran&cce...
RTAS
2011
IEEE
13 years 1 months ago
Virtual-CPU Scheduling in the Quest Operating System
This paper describes the scheduling framework for a new operating system called “Quest”. The three main goals of Quest are to ensure safety, predictability and efficiency of ...
Matthew Danish, Ye Li, Richard West
ACSAC
2010
IEEE
13 years 1 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
« Prev « First page 1418 / 1524 Last » Next »