Sciweavers

2270 search results - page 311 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
EUSFLAT
2009
152views Fuzzy Logic» more  EUSFLAT 2009»
15 years 2 months ago
Fuzzy and PSO Based Algorithm for Driver's Behavior Modeling
The study of human behavior during driving is of primary importance for the improvement of drivers' security. This study is complex because of numerous situations in which the...
Sohrab Khanmohammadi, Mohammad Ali Tinati, Sehrane...
TDSC
2010
146views more  TDSC 2010»
14 years 11 months ago
Fault Localization via Risk Modeling
Automated, rapid, and effective fault management is a central goal of large operational IP networks. Today's networks suffer from a wide and volatile set of failure modes, wh...
Ramana Rao Kompella, Jennifer Yates, Albert G. Gre...
SIGMETRICS
2008
ACM
15 years 4 months ago
A Diophantine model of routes in structured P2P overlays
Abstract-- An important intrinsic property of any structured Peer-to-Peer (P2P) overlay is multi-hop paths. Understanding their structure helps to solve challenging problems relate...
Dmitry Korzun, Andrei Gurtov
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 8 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
CONTEXT
1999
Springer
15 years 8 months ago
Contexts, Domains, and Software
We survey some issues that relate to context dependence and context sensitivity in the development of software, particularly in relation to information systems by defining a range...
Alfs T. Berztiss