#### Filter Results:

- Full text PDF available (8)

#### Publication Year

2003

2017

- This year (1)
- Last 5 years (5)
- Last 10 years (14)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Yishi Zhao, Nigel Thomas
- Perform. Eval.
- 2010

- Yishi Zhao, Nigel Thomas
- SIPEW
- 2008

- Nigel Thomas, Yishi Zhao
- EPEW
- 2009

In this paper a class of closed queueing network is modelled in the Markovian process algebra PEPA and solved using the classical Mean Value Analysis (MVA). This approach is attractive as it negates the need to derive the entire state space, and so certain metrics from large models can be obtained with little computational effort. The approach is… (More)

- Antonio Cerone, Yishi Zhao
- ECEASST
- 2013

Driver behaviour is considered a key factor in the majority of car accidents. As a consequence driver behaviour has been receiving vast attention in different domain areas, such as psychology, transport engineering and computer science. Computer scientists are primarily interested in what and how computing means can be applied to understand the relation… (More)

- Yishi Zhao, Nigel Thomas
- 2009 15th International Conference on Parallel…
- 2009

In this paper we study the overhead introduced by secure functions in considering two models of non-repudiation protocols. The models are specified using the Markovian process algebra PEPA. The basic model suffers from the well known state space explosion problem when tackled using Markov chain analysis. Following previous study of performance modelling on… (More)

- Yishi Zhao, Nigel Thomas
- 2008 The 9th International Conference for Young…
- 2008

In this paper we evaluate a cost function of a secure key distribution centre. A queueing network model has been established for this protocol. Due to the complex calculation of original equations with large scale system, more efficient asymptotic bounds approach have been introduced to implement a hybrid solution which has the advantage of efficiency and… (More)

- Yishi Zhao, Nigel Thomas
- 2009

In this paper, we described a experience of using PEPA eclipse plug-in tool to specify a functional-equivalent representation of a non-repudiation protocol. The model is specified using Markovian process algebra PEPA. The basic model suffers from the well known state space explosion problem when tackled using Continues Time Markov Chain analysis. In order… (More)

- Nigel Thomas, Michael Harrison, Yishi Zhao, Xiao Chen
- EPEW/UKPEW
- 2012

- Yishi Zhao, Nigel Thomas
- 2011 International Conference on Cyber-Enabled…
- 2011

In this paper an authentication protocol, Kerberos, is investigated. To consider the scenario where there are multiple realms, a simplification is applied. The simplified model is equivalent to original model in terms of the steady state distribution. It is analysed numerically using a fluid flow approximation and is verified by stochastic simulation.

- Leijie Sha, Jie Ding, Xiao Chen, Xiaobin Zhang, Yun Zhang, Yishi Zhao
- 2015 International Conference on Cloud Computing…
- 2015

Cloud computing integrates the computation, storage, network etc., making it behaves as a virtualized computing resource pool, and provides services to customers with the dynamic on-demand and measurable way. In order to manage these resources, some cloud computing platform management systems composed of different function modules have been developed, and… (More)