Sciweavers

1336 search results - page 85 / 268
» SMTP Path Analysis
Sort
View
ICSE
2007
IEEE-ACM
14 years 9 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
IPCCC
2006
IEEE
14 years 3 months ago
Risk reduction based survivable WDM network design
— This paper presents an investment strategy to reduce the risk associated with failures in Wavelength Division Multiplexing (WDM) optical networks. The investment strategy deter...
K. Vajanapoom, David Tipper
JAL
2006
89views more  JAL 2006»
13 years 9 months ago
Improved bounds for the unsplittable flow problem
In this paper we consider the unsplittable flow problem (UFP): given a directed or undirected network G = (V, E) with edge capacities and a set of terminal pairs (or requests) wit...
Petr Kolman, Christian Scheideler
POPL
2011
ACM
12 years 12 months ago
Dynamic inference of static types for ruby
There have been several efforts to bring static type inference to object-oriented dynamic languages such as Ruby, Python, and Perl. In our experience, however, such type inference...
Jong-hoon (David) An, Avik Chaudhuri, Jeffrey S. F...
ISCAS
2007
IEEE
138views Hardware» more  ISCAS 2007»
14 years 3 months ago
A High-Speed Delta-Sigma Modulator with Relaxed DEM Timing Requirement
Abstract—This paper presents a high-speed digital feedforward Delta-Sigma Modulator which relaxes timing requirement for the Dynamic Element Matching (DEM) algorithm. By making t...
Sunwoo Kwon, Un-Ku Moon