Sciweavers

762 search results - page 66 / 153
» Modeling and Simulating Information Security Management
Sort
View
ATAL
2004
Springer
14 years 1 months ago
Temptation and Contribution in C2C Transactions: Implications for Designing Reputation Management Systems
: A reputation management system can promote trust in transactions in an online consumer-to-consumer (C2C) market. We model a C2C market by employing an agent-based approach. To di...
Hitoshi Yamamoto, Kazunari Ishida, Toshizumi Ohta
ENTCS
2000
112views more  ENTCS 2000»
13 years 7 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
CDC
2010
IEEE
13 years 2 months ago
A hierarchical approach to energy management in data centers
This paper concerns the management of energy in data centers using a cyber-physical model that supports the coordinated control of both computational and thermal (cooling) resource...
Luca Parolini, Emanuele Garone, Bruno Sinopoli, Br...
ATAL
2010
Springer
13 years 8 months ago
Bushfire BLOCKS: a modular agent-based simulation
Bushfire BLOCKS is a modular, distributed, agent-based simulation for exploring and informing bushfire response strategies. Separate independent modules capture the fire spread, e...
David Scerri, Ferdinand Gouw, Sarah L. Hickmott, I...
VALUETOOLS
2006
ACM
167views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
Detailed cache simulation for detecting bottleneck, miss reason and optimization potentialities
Cache locality optimization is an efficient way for reducing the idle time of modern processors in waiting for needed data. This kind of optimization can be achieved either on the...
Jie Tao, Wolfgang Karl