Sciweavers

1945 search results - page 268 / 389
» Pursuit-Evasion in Models of Complex Networks
Sort
View
DBSEC
2008
152views Database» more  DBSEC 2008»
13 years 9 months ago
An Attack Graph-Based Probabilistic Security Metric
To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities....
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal,...
SIGMETRICS
2010
ACM
203views Hardware» more  SIGMETRICS 2010»
13 years 8 months ago
An analytical framework to infer multihop path reliability in MANETs
Abstract Due to complexity and intractability reasons, most of the analytical studies on the reliability of communication paths in mobile ad hoc networks are based on the assumptio...
Nelson Antunes, Gonçalo Jacinto, Antó...
BIOSYSTEMS
2007
111views more  BIOSYSTEMS 2007»
13 years 8 months ago
Event-driven simulation of neural population synchronization facilitated by electrical coupling
Most neural communication and processing tasks are driven by spikes. This has enabled the application of the event-driven simulation schemes. However the simulation of spiking neu...
Richard R. Carrillo, Eduardo Ros, Boris Barbour, C...
JCP
2008
133views more  JCP 2008»
13 years 8 months ago
YAVISTA: A Graphical Tool for Comparing 802.11 Simulators
The difficulty to compare network simulators is a major obstacle to the broader adoption of these tools. This problem particularly affects 802.11 simulators because the 802.11 prot...
Ryad Ben-El-Kezadri, Farouk Kamoun
DSN
2009
IEEE
14 years 3 months ago
A QoS-aware fault tolerant middleware for dependable service composition
Based on the framework of service-oriented architecture (SOA), complex distributed systems can be dynamically and automatically composed by integrating distributed Web services pr...
Zibin Zheng, Michael R. Lyu