Sciweavers

6229 search results - page 143 / 1246
» Models of Computation for Networks on Chip
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
AP2PS
2009
IEEE
14 years 3 months ago
Anomaly Detection in P2P Networks Using Markov Modelling
Jesús E. Díaz-Verdejo, Gabriel Maci&...
ICC
2009
IEEE
120views Communications» more  ICC 2009»
14 years 3 months ago
Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks
— This paper presents a simple method for computing throughputs of links in a CSMA network. We call our method back-of-the-envelop (BoE) computation, because for many network con...
Soung Chang Liew, Caihong Kai, Jason Leung, Bill W...
PEWASUN
2008
ACM
13 years 10 months ago
Communication models for throughput optimization in mesh networks
There has been extensive research focused on maximizing the throughput of wireless networks in general and mesh networks in particular. Recently, techniques have been developed th...
Stephan Bohacek, Peng Wang
RTCSA
2007
IEEE
14 years 3 months ago
An MPSoC Performance Estimation Framework Using Transaction Level Modeling
— To use the tremendous hardware resources available in next generation MultiProcessor Systems-on-Chip (MPSoC) efficiently, rapid and accurate design space exploration (DSE) met...
Rabie Ben Atitallah, Smaïl Niar, Samy Meftali...