Sciweavers

4636 search results - page 273 / 928
» Modelling and Validation with VipTool
Sort
View
ICC
2007
IEEE
108views Communications» more  ICC 2007»
14 years 2 months ago
Trust Establishment in Distributed Networks: Analysis and Modeling
— Recently, trust establishment is recognized as an important approach to defend distributed networks, such as mobile ad hoc networks and sensor networks, against malicious attac...
Yan Lindsay Sun, Yafei Yang
IEEESCC
2007
IEEE
14 years 2 months ago
A Meta-Model Approach for the Deployment of Services-oriented Applications
This paper presents a meta-model based approach to services applications deployment on constrained Execution Environments (EEs) which contain heterogeneous services implementation...
Antonin Chazalet, Philippe Lalanda
EDOC
2006
IEEE
14 years 2 months ago
Business Continuity Model. Regeneration System for Manufacturing Components
At present, with the expansion of information technologies at the industry, it is vital to implant proactive, self-managed systems that ensure continuous operation and, therefore,...
Diego Marcos-Jorquera, Francisco Maciá P&ea...
DATE
2000
IEEE
71views Hardware» more  DATE 2000»
14 years 21 days ago
Clocktree RLC Extraction with Efficient Inductance Modeling
In this paper, we present an efficient yet accurate inductance extraction methodology and also apply it to clocktree RLC extraction. We first show that without loss of accuracy, t...
Norman Chang, Shen Lin, O. Sam Nakagawa, Weize Xie...
COMPENG
2010
265views Algorithms» more  COMPENG 2010»
14 years 6 days ago
Ontological Framework to Model Critical Infrastructures and their Interdependencies
This paper presents a Knowledge Base System (KBS) as a key component of a federated simulation framework which allows the investigation of (inter)dependencies among Critical Infra...
Elisa Castorini, Paolo Palazzari, Alberto Tofani, ...