Sciweavers

223 search results - page 23 / 45
» Transient Model for Jackson Networks and Its Approximation
Sort
View
AAAI
2012
11 years 10 months ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
MSWIM
2005
ACM
14 years 1 months ago
Content and service replication strategies in multi-hop wireless mesh networks
Emerging multi-hop wireless mesh networks have much different characteristics than the Internet. They have low dimensionality and large diameters. Content and service replication ...
Shudong Jin, Limin Wang
PODC
2010
ACM
13 years 11 months ago
Distributed algorithms for edge dominating sets
An edge dominating set for a graph G is a set D of edges such that each edge of G is in D or adjacent to at least one edge in D. This work studies deterministic distributed approx...
Jukka Suomela
SIGMETRICS
2002
ACM
107views Hardware» more  SIGMETRICS 2002»
13 years 7 months ago
Simple analytic modeling of software contention
Being able to model contention for software resources (e.g., a critical section or database lock) is paramount to building performance models that capture all aspects of the delay...
Daniel A. Menascé
VTC
2008
IEEE
153views Communications» more  VTC 2008»
14 years 2 months ago
Symbol Error Rate of Space-Time Coded Multi-Antenna Wireless Cooperative Networks
—In this paper, we propose a generalized cooperative signal transmission model for wireless networks. In this model, the source, the destination, and an arbitrary number of relay...
Javad Vazifehdan, Jos H. Weber