Sciweavers

1599 search results - page 228 / 320
» Probabilistic Analysis of Anonymity
Sort
View
131
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Towards a Stochastic Model for Integrated Security and Dependability Evaluation
We present a new approach to integrated security and dependability evaluation, which is based on stochastic modelling techniques. Our proposal aims to provide operational measures...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
114
Voted
ACIVS
2006
Springer
15 years 9 months ago
Blue Sky Detection for Picture Quality Enhancement
Content analysis of video and still images is attractive for multiple reasons, such as enabling content-based actions and image manipulation. This paper presents a new algorithm an...
Bahman Zafarifar, Peter H. N. de With
148
Voted
VALUETOOLS
2006
ACM
162views Hardware» more  VALUETOOLS 2006»
15 years 9 months ago
Using UML state machines and petri nets for the quantitative investigation of ETCS
This paper proposes the modeling of technical systems and their behavior by means of Unified Modeling Language (UML) State Machines and the extending UML Profile for Schedulabil...
Jan Trowitzsch, Armin Zimmermann
144
Voted
ICNP
2005
IEEE
15 years 9 months ago
Expected Convergence Properties of BGP
Border Gateway Protocol (BGP) is the de facto standard used for interdomain routing. Since packet forwarding may not be possible until stable routes are learned, it is not only cr...
Ramesh Viswanathan, Krishan K. Sabnani, Robert J. ...
108
Voted
BERTINORO
2005
Springer
15 years 9 months ago
Prediction-Based Software Availability Enhancement
We propose a new paradigm for software availability enhancement. We offer a two-step strategy: Failure prediction followed by maintenance actions with the objective of avoiding imp...
Felix Salfner, Günther A. Hoffmann, Miroslaw ...