Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

559 results
Image document

Network Protocol Performance Bounding Exploiting Properties of Infinite Dimensional Linear Equations

Ioannis Stavrakakis
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.129-140, ⟨10.1007/978-3-642-25575-5_11⟩
Conference papers hal-01586892v1
Image document

On the Analysis of Queues with Heavy Tails: A Non-Extensive Maximum Entropy Formalism and a Generalisation of the Zipf-Mandelbrot Distribution

Demetres D. Kouvatsos , Salam A. Assi
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.99-111, ⟨10.1007/978-3-642-25575-5_9⟩
Conference papers hal-01586893v1
Image document

Energy: A New Criteria for Performances in Large Scale Distributed Systems

Jean-Marc Pierson
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.38-48, ⟨10.1007/978-3-642-25575-5_4⟩
Conference papers hal-01586899v1
Image document

Disappointments and Delights, Fears and Hopes induced by a few decades in Performance Evaluation

Raymond Marie
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.1-9, ⟨10.1007/978-3-642-25575-5_1⟩
Conference papers hal-00789638v1
Image document

Predicting Disk Scheduling Performance with Virtual Machines

Robert Geist , Zachary H. Jones , James Westall
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.61-72, ⟨10.1007/978-3-642-25575-5_6⟩
Conference papers hal-01586905v1
Image document

Tools for Performance Evaluation of Computer Systems: Historical Evolution and Perspectives

Giuliano Casale , Marco Gribaudo , Giuseppe Serazzi
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.24-37, ⟨10.1007/978-3-642-25575-5_3⟩
Conference papers hal-01586901v1
Image document

Modelling Social-Aware Forwarding in Opportunistic Networks

Chiara Boldrini , Marco Conti , Andrea Passarella
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.141-152, ⟨10.1007/978-3-642-25575-5_12⟩
Conference papers hal-01586891v1
Image document

A Biometrics-Based Solution to Combat SIM Swap Fraud

Louis Jordaan , Basie Von Solms
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.70-87, ⟨10.1007/978-3-642-19228-9_7⟩
Conference papers hal-01581328v1
Image document

Are BGP Routers Open to Attack? An Experiment

Ludovico Cavedon , Christopher Kruegel , Giovanni Vigna
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.88-103, ⟨10.1007/978-3-642-19228-9_8⟩
Conference papers hal-01581336v1
Image document

Model Interoperability for Performance Engineering: Survey of Milestones and Evolution

Connie U. Smith , Catalina M. Lladó
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.10-23, ⟨10.1007/978-3-642-25575-5_2⟩
Conference papers hal-01586894v1
Image document

From the Origins of Performance Evaluation to New Green ICT Performance Engineering

Carlos Juiz , Ramon Puigjaner
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.49-60, ⟨10.1007/978-3-642-25575-5_5⟩
Conference papers hal-01586904v1
Image document

Emerging and Future Cyber Threats to Critical Systems

Edita Djambazova , Magnus Almgren , Kiril Dimitrov , Erland Jonsson
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.29-46, ⟨10.1007/978-3-642-19228-9_4⟩
Conference papers hal-01581335v1
Image document

Open Research Questions of Privacy-Enhanced Event Scheduling

Benjamin Kellermann
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.9-19, ⟨10.1007/978-3-642-19228-9_2⟩
Conference papers hal-01581331v1
Image document

Practical Experiences with Purenet, a Self-Learning Malware Prevention System

Alapan Arnab , Tobias Martin , Andrew Hutchison
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.56-69, ⟨10.1007/978-3-642-19228-9_6⟩
Conference papers hal-01581334v1
Image document

Real-Time System for Assessing the Information Security of Computer Networks

Dimitrina Polimirova , Eugene Nickolov
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.123-133, ⟨10.1007/978-3-642-19228-9_11⟩
Conference papers hal-01581341v1
Image document

Security and Privacy Implications of Cloud Computing – Lost in the Cloud

Vassilka Tchifilionova
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.149-158, ⟨10.1007/978-3-642-19228-9_14⟩
Conference papers hal-01581332v1
Image document

Cloud Infrastructure Security

Dimiter Velev , Plamena Zlateva
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.140-148, ⟨10.1007/978-3-642-19228-9_13⟩
Conference papers hal-01581343v1
Image document

A Matrix-Analytic Solution for Randomized Load Balancing Models with PH Service Times

Quan-Lin Li , John Lui , Yang Wang
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.240-253, ⟨10.1007/978-3-642-25575-5_20⟩
Conference papers hal-01586888v1
Image document

Event Handoff Unobservability in WSN

Stefano Ortolani , Mauro Conti , Bruno Crispo , Roberto Di Pietro
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.20-28, ⟨10.1007/978-3-642-19228-9_3⟩
Conference papers hal-01581330v1
Image document

On Lookahead Strategy for Movement-Based Location Update: A General Formulation

Vicente Casares-Giner
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.153-166, ⟨10.1007/978-3-642-25575-5_13⟩
Conference papers hal-01586908v1
Image document

Markov Chains and Spectral Clustering

Ning Liu , William J. Stewart
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.87-98, ⟨10.1007/978-3-642-25575-5_8⟩
Conference papers hal-01586907v1
Image document

Bayesian Estimation of Network-Wide Mean Failure Probability in 3G Cellular Networks

Angelo Coluccia , Fabio Ricciato , Peter Romirer-Maierhofer
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.167-178, ⟨10.1007/978-3-642-25575-5_14⟩
Conference papers hal-01586897v1
Image document

Evidential Notions of Defensibility and Admissibility with Property Preservation

Raphael Phan , Ahmad R. Amran , John N. Whitley , David J. Parish
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.134-139, ⟨10.1007/978-3-642-19228-9_12⟩
Conference papers hal-01581333v1
Image document

Modeling Wireless Sensor Networks Using Finite-Source Retrial Queues with Unreliable Orbit

Patrick Wüchner , János Sztrik , Hermann De Meer
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.73-86, ⟨10.1007/978-3-642-25575-5_7⟩
Conference papers hal-01586895v1
Image document

Some Technologies for Information Security Protection in Weak-Controlled Computer Systems and Their Applicability for eGovernment Services Users

Anton Palazov
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.117-122, ⟨10.1007/978-3-642-19228-9_10⟩
Conference papers hal-01581339v1
Image document

Time Is Perception Is Money – Web Response Times in Mobile Networks with Application to Quality of Experience

Markus Fiedler , Patrik Arlos , Timothy A. Gonsalves , Anuraag Bhardwaj , Hans Nottehed
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.179-190, ⟨10.1007/978-3-642-25575-5_15⟩
Conference papers hal-01586896v1
Image document

Performance Evaluation with Hidden Markov Models

E. De Souza E Silva , R. Leão , Richard R. Muntz
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.112-128, ⟨10.1007/978-3-642-25575-5_10⟩
Conference papers hal-01586903v1
Image document

Adversarial Security: Getting to the Root of the Problem

Raphael Phan , John N. Whitley , David J. Parish
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.47-55, ⟨10.1007/978-3-642-19228-9_5⟩
Conference papers hal-01581338v1
Image document

AWPS – An Architecture for Pro-active Web Performance Management

Gabriele Kotsis , Martin Pinzger
Performance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.215-226, ⟨10.1007/978-3-642-25575-5_18⟩
Conference papers hal-01586898v1
Image document

Securing the Internet: Fact or Fiction?

Basie Von Solms
1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.1-8, ⟨10.1007/978-3-642-19228-9_1⟩
Conference papers hal-01581340v1