Sciweavers

1382 search results - page 6 / 277
» Strider: Configuration Modelling and Analysis of Complex Sys...
Sort
View
SSS
2010
Springer
139views Control Systems» more  SSS 2010»
13 years 6 months ago
Vulnerability Analysis of High Dimensional Complex Systems
Complex systems experience dramatic changes in behavior and can undergo transitions from functional to dysfunctional states. An unstable system is prone to dysfunctional collective...
Vedant Misra, Dion Harmon, Yaneer Bar-Yam
IEAAIE
1998
Springer
13 years 12 months ago
Generating Heuristics to Control Configuration Processes
Abstract. Configuration is the process of composing a system from a set of components such that the system fulfills a set of desired demands. The configuration process relies on a ...
Benno Stein
DKE
2006
84views more  DKE 2006»
13 years 7 months ago
Mining configurable enterprise information systems
Process mining is the extraction of a process model from system logs. These logs have to meet minimum requirements, i.e. each event should refer to a case and a task. Many system ...
Monique H. Jansen-Vullers, Wil M. P. van der Aalst...
ICDE
2005
IEEE
100views Database» more  ICDE 2005»
14 years 9 months ago
Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants
Standard multi-party computation models assume semi-honest behavior, where the majority of participants implement protocols according to specification, an assumption not always pl...
Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket,...
MMS
2000
13 years 7 months ago
Video Placement and Configuration of Distributed Video Servers on Cable TV Networks
A large-scale, distributed video-on-demand (VOD) system allows geographically dispersed residential and business users to access video services, such as movies and other multimedia...
Constantinos Vassilakis, Michael Paterakis, Peter ...