|
Thread / Post | Tags |
Title: Rules of Designing Routing Metrics for Greedy Face and Combined Greedy-Face Routin Page Link: Rules of Designing Routing Metrics for Greedy Face and Combined Greedy-Face Routin - Posted By: chinnu
Created at: Thursday 17th of August 2017 07:57:53 AM
| |
Rules of Designing Routing Metrics for Greedy,
Face, and Combined Greedy-Face Routing
Yujun Li, Yaling Yang, and Xianliang Lu
Abstract
Different geographic routing protocols have different requirements on routing metric designs to ensure proper operation.
Combining a wrong type of routing metrics with a geographic routing protocol may produce unexpected results, such as geographic
routing loops and unreachable nodes. In this paper, we propose a novel routing algebra system to investigate the compatibilities
be ....etc
[:=Read Full Message Here=:]
|
|
|
|
Title: Software metrics analysis and visualization tool Page Link: Software metrics analysis and visualization tool - Posted By: harsha
Created at: Thursday 17th of August 2017 08:30:13 AM
| |
Software metrics analysis and visualization tool
Abstract:
S-Metrics Visualizer is a software development metrics acquisition and visualization tool for Windows. Throughout the software development process managers must be aware of the current status, timeline, risk, and resource demands of their projects. Software products commonly end up
requiring more time and money than initially expected and, even with the amount of expended resources, projects often do not meet their initial
requirements specifications. Looking back after the deve ....etc
[:=Read Full Message Here=:]
|
|
|
|
Title: Bio-metrics Page Link: Bio-metrics - Posted By: vani
Created at: Thursday 17th of August 2017 05:15:46 AM
| |
Definition
Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics such as finger scan, retina, iris, voice scan, signature scan etc. This method of identification is preferred over traditional
methods involving passwords and PIN numbers for various reasons: the person to be identified is required to be physically present at the point-of-identification; identification based on biometric techniques obviates the need to remember a password or carry a token. With the increased us ....etc
[:=Read Full Message Here=:]
|
Title: Extending Attack Graph-Based Security Metrics and Aggregating Their Application Page Link: Extending Attack Graph-Based Security Metrics and Aggregating Their Application - Posted By: ana
Created at: Thursday 05th of October 2017 05:25:53 AM
| |
Abstract The attack graph is an abstraction that reveals the ways an attacker can leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security-relevant aspects of a network. The Shortest Path metric, the Number of Paths metric, and the Mean of Path Lengths metric are three attack graph-based security metrics that can extract security-relevant information. However, one's usage of these metrics can lead to misleading results. ....etc
[:=Read Full Message Here=:]
|
|
|
Title: A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Page Link: A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed - Posted By: susheelkumar
Created at: Thursday 17th of August 2017 04:49:27 AM
| |
Abstract
This paper describes a set of metrics that will help administrators of distributed, real-time (clustered) computer facilities to select the best intrusion detection system for their facilities. The metrics herein are the subset of our general metric set that particularly impact real-time and distributed processing issues. We discuss related works in this field, the role of intrusion detection in information assurance, some basic classes of intrusion detection systems, a general architecture of network intrusion det ....etc
[:=Read Full Message Here=:]
|
Title: extending attack graph based security metrics and aggregating their application ppt Page Link: extending attack graph based security metrics and aggregating their application ppt - Posted By: afie
Created at: Thursday 05th of October 2017 04:38:46 AM
| |
To get full information or details of extending attack graph based security metrics and aggregating their application please have a look on the pages
http://seminarsprojects.net/Thread-extending-attack-graph-based-security-metrics-and-aggregating-their-application
if you again feel trouble on extending attack graph based security metrics and aggregating their application please reply in that page and ask specific fields ....etc
[:=Read Full Message Here=:]
|
Title: Coupling Based Metrics for Measuring the quality of a software Page Link: Coupling Based Metrics for Measuring the quality of a software - Posted By: siddhartha53
Created at: Thursday 17th of August 2017 08:17:52 AM
| |
Coupling Based Metrics for Measuring the quality of a software
ABSTRACT
The main aim of this project is to introduce a new set of metrics that measure the quality of modularization of a object-oriented software system. These metrics characterize the software from a variety of perspectives such as structural, architectural and notions like similarity of purposes. Structural refers to inter-module coupling-based notions. Architectural refers to the horizontal layering of modules in large software systems. The notion of A ....etc
[:=Read Full Message Here=:]
|
Title: high throughput multicast routing metrics in wireless mesh networks ppt Page Link: high throughput multicast routing metrics in wireless mesh networks ppt - Posted By: annabobic
Created at: Thursday 05th of October 2017 04:36:34 AM
| |
to get information about the topic high throughput multicast routing metrics in wireless mesh networks full report ppt and related topic refer the page link bellow
http://seminarsprojects.net/Thread-secure-high-throughput-multicast-routing-in-wireless-mesh-networks
http://seminarsprojects.net/Thread-rules-of-designing-routing-metrics-for-greedy-face-and-combined-greedy-face-routing ....etc
[:=Read Full Message Here=:]
|
Title: AN EVENT-BASED FRAMEWORK FOR OBJECT-ORIENTED ANALYSIS COMPUTATION OF METRICS Page Link: AN EVENT-BASED FRAMEWORK FOR OBJECT-ORIENTED ANALYSIS COMPUTATION OF METRICS - Posted By: faisal moideen
Created at: Friday 06th of October 2017 02:58:56 PM
| |
AN EVENT-BASED FRAMEWORK FOR OBJECT-ORIENTED ANALYSIS, COMPUTATION OF METRICS AND IDENTIFICATION OF TEST SCENARIOS
Software is everywhere. It lets us get cash from an Automatic Teller Machine (ATM), make a phone call and drive our cars. An average company spends about 4 to 5 percent of its revenue on Information Technology (IT), whereas companies which are highly IT dependent, such as finance and telecommunications are spending more than 10 percent on it. In other words, IT sector has now one of the largest co ....etc
[:=Read Full Message Here=:]
|
Title: analysis of quality of object oriented systems using object oriented metrics ppt Page Link: analysis of quality of object oriented systems using object oriented metrics ppt - Posted By: boss
Created at: Thursday 17th of August 2017 05:24:03 AM
| |
pls sent about analysis of quality of object oriented systems using object oriented metrics ppt
thanku. ....etc
[:=Read Full Message Here=:]
|