Sciweavers

2715 search results - page 469 / 543
» Network bucket testing
Sort
View
IOLTS
2002
IEEE
127views Hardware» more  IOLTS 2002»
14 years 22 days ago
Fault Tolerance Evaluation Using Two Software Based Fault Injection Methods
A silicon independent C-Based model of the TTP/C protocol was implemented within the EU-founded project FIT. The C-based model is integrated in the C-Sim simulation environment. T...
Astrit Ademaj, Petr Grillinger, Pavel Herout, Jan ...
PARELEC
2002
IEEE
14 years 22 days ago
Real-Time Scheduling in Distributed Systems
In this paper, we investigate the worst case performance of Earliest Due Date algorithm when applied to packet scheduling in distributed systems. We assume that the processing ele...
Nguyen Duc Thai
RTAS
2002
IEEE
14 years 22 days ago
The Aperiodic Multiprocessor Utilization Bound for Liquid Tasks
Real-time scheduling theory has developed powerful tools for translating conditions on aggregate system utilization into per-task schedulability guarantees. The main breakthrough ...
Tarek F. Abdelzaher, Björn Andersson, Jan Jon...
HAIS
2010
Springer
14 years 18 days ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
MM
2009
ACM
133views Multimedia» more  MM 2009»
14 years 14 days ago
Friend recommendation according to appearances on photos
Unlike the questionnaire based friend recommendation scheme used in Social Network Service (SNS) websites nowadays (e.g. online dating sites, online matchmaking sites), we focus o...
Zhipeng Wu, Shuqiang Jiang, Qingming Huang