David Nicol
David Nicol
William and Mary, Dartmouth, University of Illinois
Bestätigte E-Mail-Adresse bei illinois.edu - Startseite
Zitiert von
Zitiert von
Discrete event system simulation
J Banks
Pearson Education India, 2005
Model-based evaluation: from dependability to security
DM Nicol, WH Sanders, KS Trivedi
IEEE Transactions on dependable and secure computing 1 (1), 48-65, 2004
High-performance cloud computing: A view of scientific applications
C Vecchiola, S Pandey, R Buyya
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
Estimating the probability of failure when testing reveals no failures
KW Miller, LJ Morell, RE Noonan, SK Park, DM Nicol, BW Murrill, M Voas
IEEE transactions on Software Engineering 18 (1), 33, 1992
Modeling the global internet
JH Cowie, DM Nicol, AT Ogielski
Computing in Science & Engineering 1 (1), 42-50, 1999
Trust mechanisms for cloud computing
J Huang, DM Nicol
Journal of Cloud Computing: Advances, Systems and Applications 2 (1), 1-14, 2013
The cost of conservative synchronization in parallel discrete event simulations
DM Nicol
Journal of the ACM (JACM) 40 (2), 304-333, 1993
Fluid stochastic Petri nets: Theory, applications, and solution techniques
G Horton, VG Kulkarni, DM Nicol, KS Trivedi
European Journal of Operational Research 105 (1), 184-201, 1998
Analysis of distributed policy rule-sets for compliance with global policy
DM Nicol, WH Sanders, S Singh, M Seri
US Patent 8,209,738, 2012
SCADA cyber security testbed development
CM Davis, JE Tate, H Okhravi, C Grier, TJ Overbye, D Nicol
2006 38th North American Power Symposium, 483-488, 2006
Parallel discrete-event simulation of FCFS stochastic queueing networks
DM Nicol
ACM SIGPLAN Notices 23 (9), 124-137, 1988
Parallel simulation today
D Nicol, R Fujimoto
Annals of Operations Research 53 (1), 249-285, 1994
Towards realistic million-node internet simulations
J Cowie, H Liu, J Liu, D Nicol, A Ogielski
in International Conference on Parallel and Distributed Processing …, 1999
The Koobface botnet and the rise of social malware
K Thomas, DM Nicol
2010 5th International Conference on Malicious and Unwanted Software, 63-70, 2010
Simulating realistic network worm traffic for worm warning system design and testing
M Liljenstam, DM Nicol, VH Berk, RS Gray
Proceedings of the 2003 ACM workshop on Rapid Malcode, 24-33, 2003
Dynamic remapping of parallel computations with varying resource demands
DM Nicol, JH Saltz
IEEE Transactions on Computers 37 (9), 1073-1087, 1988
unfriendly: Multi-party privacy risks in social networks
K Thomas, C Grier, DM Nicol
International Symposium on Privacy Enhancing Technologies Symposium, 236-252, 2010
Crowd simulation for emergency response using BDI agent based on virtual reality
A Shendarkar, K Vasudevan, S Lee, YJ Son
Proceedings of the 2006 winter simulation conference, 545-553, 2006
Discrete-event simulation of fluid stochastic Petri nets
G Ciardo, DM Nicol, KS Trivedi
IEEE transactions on software engineering 25 (2), 207-217, 1999
Aggregated path authentication for efficient BGP security
M Zhao, SW Smith, DM Nicol
Proceedings of the 12th ACM conference on Computer and communications …, 2005
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20