In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
Acquisition of “quantitative” models of sufficient accuracy to enable effective analysis of requirements tradeoffs is hampered by the slowness and difficulty of obtaining su...
Mobility of users significantly impacts performance of a mobile ad-hoc network. Most existing simulation tools offer only a few random mobility models, which poorly reflect user m...
Designers of factory automation applications increasingly demand for tools for rapid prototyping of hardware extensions to existing systems and verification of resulting behavior...
Franco Fummi, Mirko Loghi, Stefano Martini, Marco ...
We describe a modular reference implementation of an IPbased DSL access multiplexer (DSLAM). We identify deployment trends and primary tasks a future DSLAM has to offer. The imple...