Sciweavers

1599 search results - page 228 / 320
» Probabilistic Analysis of Anonymity
Sort
View
IEEEARES
2006
IEEE
14 years 2 months ago
Towards a Stochastic Model for Integrated Security and Dependability Evaluation
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
ACIVS
2006
Springer
14 years 2 months ago
Blue Sky Detection for Picture Quality Enhancement
Content analysis of video and still images is attractive for multiple reasons, such as enabling content-based actions and image manipulation. This paper presents a new algorithm an...
Bahman Zafarifar, Peter H. N. de With
VALUETOOLS
2006
ACM
162views Hardware» more  VALUETOOLS 2006»
14 years 2 months ago
Using UML state machines and petri nets for the quantitative investigation of ETCS
This paper proposes the modeling of technical systems and their behavior by means of Unified Modeling Language (UML) State Machines and the extending UML Profile for Schedulabil...
Jan Trowitzsch, Armin Zimmermann
ICNP
2005
IEEE
14 years 1 months ago
Expected Convergence Properties of BGP
Border Gateway Protocol (BGP) is the de facto standard used for interdomain routing. Since packet forwarding may not be possible until stable routes are learned, it is not only cr...
Ramesh Viswanathan, Krishan K. Sabnani, Robert J. ...
BERTINORO
2005
Springer
14 years 1 months ago
Prediction-Based Software Availability Enhancement
We propose a new paradigm for software availability enhancement. We offer a two-step strategy: Failure prediction followed by maintenance actions with the objective of avoiding imp...
Felix Salfner, Günther A. Hoffmann, Miroslaw ...