This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
Recent research has shown that server-driven protocols for achieving cache consistency in wide-area network services can perform significantly better than traditional consistency ...
Jian Yin, Lorenzo Alvisi, Michael Dahlin, Arun Iye...
The paper presents an evaluation method for e-learning platforms, based on different types of measurements collected in logs of interactions during learning sessions, and on the an...
Vlad Posea, Dan Mihaila, Stefan Trausan-Matu, Vale...
Abstract. IEEE 802.11 WLAN technology has become an inexpensive, yet powerful access technology that is targeted at mobile users that remain within reach of the hot-spot. Such hot-...
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...