Sciweavers

421 search results - page 11 / 85
» Optimal Trust Network Analysis with Subjective Logic
Sort
View
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
13 years 11 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob
ICYCS
2008
IEEE
14 years 2 months ago
VM-based Architecture for Network Monitoring and Analysis
A single physical machine provides multiple network monitoring and analysis services (e.g., IDS, QoS) which are installed on the same operating system. Isolation between services ...
Qiang Li, Qinfen Hao, Limin Xiao, Zhoujun Li
INFOSCALE
2007
ACM
13 years 9 months ago
Ontology driven adaptive data processing in wireless sensor networks
It is important to provide adaptive data processing in wireless sensor networks in order to deal with various applications. In this paper,we propose a WIreless Sensor Networks Ont...
Yuheng Hu, Zhendong Wu, Ming Guo
ICCAD
1992
IEEE
93views Hardware» more  ICCAD 1992»
13 years 11 months ago
Timing analysis in high-level synthesis
This paper presents a comprehensive timing model for behavioral-level specifications and algorithms for timing analysis in high-level synthesis. It is based on a timing network wh...
Andreas Kuehlmann, Reinaldo A. Bergamaschi
SIAMJO
2010
121views more  SIAMJO 2010»
13 years 6 months ago
Optimization Strategies for the Vulnerability Analysis of the Electric Power Grid
Identifying small groups of lines, whose removal would cause a severe blackout, is critical for the secure operation of the electric power grid. We show how power grid vulnerabilit...
Ali Pinar, Juan Meza, Vaibhav Donde, Bernard C. Le...