Filter your results
- 537
- 19
- 3
- 535
- 2
- 536
- 1
- 1
- 34
- 503
- 537
- 27
- 9
- 8
- 7
- 7
- 6
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 5
- 5
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
|
Securing the Internet: Fact or Fiction?1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.1-8, ⟨10.1007/978-3-642-19228-9_1⟩
Conference papers
hal-01581340v1
|
||
|
Analysis of Web Logs: Challenges and FindingsPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.227-239, ⟨10.1007/978-3-642-25575-5_19⟩
Conference papers
hal-01586906v1
|
||
|
The Need for Interoperable Reputation Systems1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.159-169, ⟨10.1007/978-3-642-19228-9_15⟩
Conference papers
hal-01581337v1
|
||
|
Securing the Core University Business Processes1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.104-116, ⟨10.1007/978-3-642-19228-9_9⟩
Conference papers
hal-01581344v1
|
||
|
On traffic domination in communication networksPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienne, Austria. pp.191-202, ⟨10.1007/978-3-642-25575-5_16⟩
Conference papers
hal-01301879v1
|
||
|
Network Protocol Performance Bounding Exploiting Properties of Infinite Dimensional Linear EquationsPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.129-140, ⟨10.1007/978-3-642-25575-5_11⟩
Conference papers
hal-01586892v1
|
||
|
On the Analysis of Queues with Heavy Tails: A Non-Extensive Maximum Entropy Formalism and a Generalisation of the Zipf-Mandelbrot DistributionPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.99-111, ⟨10.1007/978-3-642-25575-5_9⟩
Conference papers
hal-01586893v1
|
||
|
Energy: A New Criteria for Performances in Large Scale Distributed SystemsPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.38-48, ⟨10.1007/978-3-642-25575-5_4⟩
Conference papers
hal-01586899v1
|
||
|
Emerging and Future Cyber Threats to Critical Systems1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.29-46, ⟨10.1007/978-3-642-19228-9_4⟩
Conference papers
hal-01581335v1
|
||
|
Open Research Questions of Privacy-Enhanced Event Scheduling1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.9-19, ⟨10.1007/978-3-642-19228-9_2⟩
Conference papers
hal-01581331v1
|
||
|
Practical Experiences with Purenet, a Self-Learning Malware Prevention System1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.56-69, ⟨10.1007/978-3-642-19228-9_6⟩
Conference papers
hal-01581334v1
|
||
|
Tools for Performance Evaluation of Computer Systems: Historical Evolution and PerspectivesPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.24-37, ⟨10.1007/978-3-642-25575-5_3⟩
Conference papers
hal-01586901v1
|
||
|
Modelling Social-Aware Forwarding in Opportunistic NetworksPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.141-152, ⟨10.1007/978-3-642-25575-5_12⟩
Conference papers
hal-01586891v1
|
||
|
A Biometrics-Based Solution to Combat SIM Swap Fraud1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.70-87, ⟨10.1007/978-3-642-19228-9_7⟩
Conference papers
hal-01581328v1
|
||
|
Are BGP Routers Open to Attack? An Experiment1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.88-103, ⟨10.1007/978-3-642-19228-9_8⟩
Conference papers
hal-01581336v1
|
||
|
Model Interoperability for Performance Engineering: Survey of Milestones and EvolutionPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.10-23, ⟨10.1007/978-3-642-25575-5_2⟩
Conference papers
hal-01586894v1
|
||
|
From the Origins of Performance Evaluation to New Green ICT Performance EngineeringPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.49-60, ⟨10.1007/978-3-642-25575-5_5⟩
Conference papers
hal-01586904v1
|
||
|
Disappointments and Delights, Fears and Hopes induced by a few decades in Performance EvaluationPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.1-9, ⟨10.1007/978-3-642-25575-5_1⟩
Conference papers
hal-00789638v1
|
||
|
Predicting Disk Scheduling Performance with Virtual MachinesPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.61-72, ⟨10.1007/978-3-642-25575-5_6⟩
Conference papers
hal-01586905v1
|
||
|
Real-Time System for Assessing the Information Security of Computer Networks1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.123-133, ⟨10.1007/978-3-642-19228-9_11⟩
Conference papers
hal-01581341v1
|
||
|
Security and Privacy Implications of Cloud Computing – Lost in the Cloud1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.149-158, ⟨10.1007/978-3-642-19228-9_14⟩
Conference papers
hal-01581332v1
|
||
|
Cloud Infrastructure Security1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.140-148, ⟨10.1007/978-3-642-19228-9_13⟩
Conference papers
hal-01581343v1
|
||
|
A Matrix-Analytic Solution for Randomized Load Balancing Models with PH Service TimesPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.240-253, ⟨10.1007/978-3-642-25575-5_20⟩
Conference papers
hal-01586888v1
|
||
|
Event Handoff Unobservability in WSN1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.20-28, ⟨10.1007/978-3-642-19228-9_3⟩
Conference papers
hal-01581330v1
|
||
|
On Lookahead Strategy for Movement-Based Location Update: A General FormulationPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.153-166, ⟨10.1007/978-3-642-25575-5_13⟩
Conference papers
hal-01586908v1
|
||
|
Markov Chains and Spectral ClusteringPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.87-98, ⟨10.1007/978-3-642-25575-5_8⟩
Conference papers
hal-01586907v1
|
||
|
Bayesian Estimation of Network-Wide Mean Failure Probability in 3G Cellular NetworksPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.167-178, ⟨10.1007/978-3-642-25575-5_14⟩
Conference papers
hal-01586897v1
|
||
|
Evidential Notions of Defensibility and Admissibility with Property Preservation1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.134-139, ⟨10.1007/978-3-642-19228-9_12⟩
Conference papers
hal-01581333v1
|
||
|
Modeling Wireless Sensor Networks Using Finite-Source Retrial Queues with Unreliable OrbitPerformance Evaluation of Computer and Communication Systems (PERFORM), Oct 2010, Vienna, Austria. pp.73-86, ⟨10.1007/978-3-642-25575-5_7⟩
Conference papers
hal-01586895v1
|
||
|
Some Technologies for Information Security Protection in Weak-Controlled Computer Systems and Their Applicability for eGovernment Services Users1st Open Research Problems in Network Security (iNetSec), Mar 2010, Sofia, Bulgaria. pp.117-122, ⟨10.1007/978-3-642-19228-9_10⟩
Conference papers
hal-01581339v1
|