Sciweavers

1370 search results - page 195 / 274
» Performance analysis and optimization of latency insensitive...
Sort
View
ATAL
2005
Springer
15 years 10 months ago
Efficient information retrieval using mobile agents
We are concerned with the use of Mobile Agents for information retrieval. A multi-agent system is considered; a number of agents are involved in a collective effort to retrieve di...
Irene Sygkouna, Miltiades E. Anagnostou
CORR
2010
Springer
103views Education» more  CORR 2010»
15 years 2 months ago
On the Queueing Behavior of Random Codes over a Gilbert-Elliot Erasure Channel
This paper considers the queueing performance of a system that transmits coded data over a time-varying erasure channel. In our model, the queue length and channel state together f...
Parimal Parag, Jean-François Chamberland, H...
DBSEC
2006
131views Database» more  DBSEC 2006»
15 years 6 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
DAC
2006
ACM
16 years 5 months ago
Stochastic variational analysis of large power grids considering intra-die correlations
For statistical timing and power analysis that are very important problems in the sub-100nm technologies, stochastic analysis of power grids that characterizes the voltage fluctua...
Praveen Ghanta, Sarma B. K. Vrudhula, Sarvesh Bhar...
ACSAC
2008
IEEE
15 years 11 months ago
Defending Against Attacks on Main Memory Persistence
Main memory contains transient information for all resident applications. However, if memory chip contents survives power-off, e.g., via freezing DRAM chips, sensitive data such a...
William Enck, Kevin R. B. Butler, Thomas Richardso...