David Nicol
David Nicol
William and Mary, Dartmouth, University of Illinois
E-mail confirmado em - Página inicial
Citado por
Citado por
Discrete event system simulation
J Banks
Pearson Education India, 2005
Model-based evaluation: from dependability to security
DM Nicol, WH Sanders, KS Trivedi
IEEE Transactions on dependable and secure computing 1 (1), 48-65, 2004
Analysis of distributed policy rule-sets for compliance with global policy
DM Nicol, WH Sanders, S Singh, M Seri
US Patent 8,209,738, 2012
Estimating the probability of failure when testing reveals no failures
KW Miller, LJ Morell, RE Noonan, SK Park, DM Nicol, BW Murrill, M Voas
IEEE transactions on Software Engineering 18 (1), 33, 1992
A bee colony optimization algorithm to job shop scheduling
CS Chong, MYH Low, AI Sivakumar, KL Gay
Proceedings of the 2006 winter simulation conference, 1954-1961, 2006
Trust mechanisms for cloud computing
J Huang, DM Nicol
Journal of Cloud Computing: Advances, Systems and Applications 2, 1-14, 2013
Modeling the global internet
JH Cowie, DM Nicol, AT Ogielski
Computing in Science & Engineering 1 (1), 42-50, 1999
The cost of conservative synchronization in parallel discrete event simulations
DM Nicol
Journal of the ACM (JACM) 40 (2), 304-333, 1993
Fluid stochastic Petri nets: Theory, applications, and solution techniques
G Horton, VG Kulkarni, DM Nicol, KS Trivedi
European Journal of Operational Research 105 (1), 184-201, 1998
SCADA cyber security testbed development
CM Davis, JE Tate, H Okhravi, C Grier, TJ Overbye, D Nicol
2006 38th North American Power Symposium, 483-488, 2006
Parallel discrete-event simulation of FCFS stochastic queueing networks
DM Nicol
ACM SIGPLAN Notices 23 (9), 124-137, 1988
Parallel simulation today
D Nicol, R Fujimoto
Annals of Operations Research 53, 249-285, 1994
Discrete-event system simulation: Pearson new international edition
J Banks, JS Carson, BL Nelson, DM Nicol
Pearson Higher Ed, 2013
The Koobface botnet and the rise of social malware
K Thomas, DM Nicol
2010 5th International Conference on Malicious and Unwanted Software, 63-70, 2010
unfriendly: Multi-party privacy risks in social networks
K Thomas, C Grier, DM Nicol
Privacy Enhancing Technologies: 10th International Symposium, PETS 2010 …, 2010
Towards realistic million-node internet simulations
J Cowie, H Liu, J Liu, D Nicol, A Ogielski
in International Conference on Parallel and Distributed Processing …, 1999
Dynamic remapping of parallel computations with varying resource demands
DM Nicol, JH Saltz
IEEE Transactions on Computers 37 (9), 1073-1087, 1988
Simulating realistic network worm traffic for worm warning system design and testing
M Liljenstam, DM Nicol, VH Berk, RS Gray
Proceedings of the 2003 ACM workshop on Rapid Malcode, 24-33, 2003
A post-disaster mobility model for delay tolerant networking
MYS Uddin, DM Nicol, TF Abdelzaher, RH Kravets
Proceedings of the 2009 winter simulation conference (WSC), 2785-2796, 2009
Aggregated path authentication for efficient BGP security
M Zhao, SW Smith, DM Nicol
Proceedings of the 12th ACM conference on Computer and communications …, 2005
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20