Sciweavers

175 search results - page 23 / 35
» Password policy simulation and analysis
Sort
View
DIMVA
2007
13 years 10 months ago
Distributed Evasive Scan Techniques and Countermeasures
Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the inf...
Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song
AIPS
2003
13 years 10 months ago
A Framework for Planning in Continuous-time Stochastic Domains
We propose a framework for policy generation in continuoustime stochastic domains with concurrent actions and events of uncertain duration. We make no assumptions regarding the co...
Håkan L. S. Younes, David J. Musliner, Reid ...
ICCD
2007
IEEE
98views Hardware» more  ICCD 2007»
14 years 6 months ago
Priority-monotonic energy management for real-time systems with reliability requirements
Considering the impact of the popular energy management technique Dynamic Voltage and Frequency Scaling (DVFS) on system reliability, the Reliability-Aware Power Management (RA-PM...
Dakai Zhu, Xuan Qi, Hakan Aydin
CDC
2008
IEEE
107views Control Systems» more  CDC 2008»
14 years 3 months ago
Resource pooling for optimal evacuation of a large building
— This paper is concerned with modeling, analysis and optimization/control of occupancy evolution in a large building. The main concern is efficient evacuation of a building in ...
Kun Deng, Wei Chen, Prashant G. Mehta, Sean P. Mey...
EMSOFT
2005
Springer
14 years 2 months ago
Communication strategies for shared-bus embedded multiprocessors
Abstract— This paper explores the problem of efficiently ordering interprocessor communication operations in both statically and dynamically-scheduled multiprocessors for iterat...
Neal K. Bambha, Shuvra S. Bhattacharyya