Sciweavers

545 search results - page 37 / 109
» Modeling the tele-immersive systems using stochastic activit...
Sort
View
SMC
2007
IEEE
14 years 2 months ago
Network security project management: a security policy-based approach
— Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic...
Jihène Krichène, Noureddine Boudriga
JCNS
2006
94views more  JCNS 2006»
13 years 7 months ago
On the application of "equation-free modelling" to neural systems
"Equation-free modelling" is a recently-developed technique for bridging the gap between detailed, microscopic descriptions of systems and macroscopic descriptions of the...
Carlo R. Laing
ETT
2000
149views Education» more  ETT 2000»
13 years 7 months ago
Channel Allocation with Recovery Strategy in Wireless Networks
With the increasing penetration of wireless communications systems, customers are expecting the same level of service, reliability and performance from the wireless communication s...
Yue Ma, James J. Han, Kishor S. Trivedi
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
13 years 8 months ago
Evolution of discrete gene regulatory models
Gene regulatory networks (GRNs) are complex control systems that govern the interaction of genes, which ultimately control cellular processes at the protein level. GRNs can be ted...
Afshin Esmaeili, Christian Jacob
OSDI
2008
ACM
14 years 8 months ago
Probabilistic Inference in Queueing Networks
Although queueing models have long been used to model the performance of computer systems, they are out of favor with practitioners, because they have a reputation for requiring u...
Charles A. Sutton, Michael I. Jordan