Sciweavers

1224 search results - page 156 / 245
» Modeling and performance analysis of BitTorrent-like peer-to...
Sort
View

Publication
391views
14 years 10 months ago
Pedestrian access to transit: Identifying redundancies and gaps using a variable service area analysis
Identifying the percentage of the population being served by a transit system in a metropolitan region is a key performance measure. This performance measure depends mainly on the ...
El-Geneidy, A., Tétreault, P. & Surprenant-Legaul...
IV
2008
IEEE
296views Visualization» more  IV 2008»
14 years 3 months ago
Revealing Subnetwork Roles using Contextual Visualization: Comparison of Metabolic Networks
This article is addressing a recurrent problem in biology: mining newly built large scale networks. Our approach consists in comparing these new networks to well known ones. The v...
Romain Bourqui, Fabien Jourdan
CONCUR
1999
Springer
14 years 1 months ago
Partial Order Reduction for Model Checking of Timed Automata
Abstract. The paper presents a partial order reduction method applicable to networks of timed automata. The advantage of the method is that it reduces both the number of explored c...
Marius Minea
MSWIM
2005
ACM
14 years 2 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
DSN
2003
IEEE
14 years 2 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...