Sciweavers

1030 search results - page 15 / 206
» Performance Evaluation of Network Systems Accounting for Use...
Sort
View
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 3 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
ICC
1997
IEEE
109views Communications» more  ICC 1997»
14 years 28 days ago
Modeling of Terminal Mobility to Evaluate the Number of Location Updates
Abstract: Since mobile user mobility behaviors can vary according to time periods, e.g. office-going/closing and office hours, the location management traffic load for tracking ...
Min Young Chung, Tai Suk Kim, Ho Shin Sho, Dan Keu...
ACSD
2010
IEEE
220views Hardware» more  ACSD 2010»
13 years 6 months ago
Towards Performance Evaluation of Mobile Ad Hoc Network Protocols
We present a formal framework to evaluate stochastic properties of MANET protocols. It captures the interplay between stochastic behavior of protocols deployed at different network...
Fatemeh Ghassemi, Ali Movaghar, Wan Fokkink
ICDCSW
2008
IEEE
14 years 3 months ago
On Feasibility of P2P On-Demand Streaming via Empirical VoD User Behavior Analysis
—In its current art, peer-to-peer streaming solution has been mainly employed in the domain of live event broadcasting. In such a paradigm, users are required to simultaneously p...
Bin Chang, Liang Dai, Yi Cui, Yuan Xue
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 8 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi