Sciweavers

127 search results - page 25 / 26
» A multiple failure propagation model in GMPLS-based networks
Sort
View
EPEW
2007
Springer
13 years 12 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...
DSN
2006
IEEE
13 years 12 months ago
Designing dependable storage solutions for shared application environments
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...
INFOCOM
2003
IEEE
13 years 11 months ago
Protection Mechanisms for Optical WDM Networks based on Wavelength Converter
Abstract— This paper studies the problem of designing survivable optical wavelength division multiplexed (WDM) networks. A wavelength-routed wide area backbone network supporting...
Sunil Gowda, Krishna M. Sivalingam
CNSR
2007
IEEE
122views Communications» more  CNSR 2007»
14 years 3 days ago
Risk Analysis in Critical Infrastructure Systems based on the Astrolabe Methodology
Critical infrastructure systems are complex networks of adaptive socio-technical systems that provide the most fundamental requirements of the society. Their importance in the smo...
Ebrahim Bagheri, Ali A. Ghorbani
ICMCS
2006
IEEE
125views Multimedia» more  ICMCS 2006»
13 years 11 months ago
COSMOS: Peer-to-Peer Collaborative Streaming Among Mobiles
In traditional mobile streaming networks such as 3G cellular networks, all users pull streams from a server. Such pull model leads to high streaming cost and problem in system sca...
Man-Fung Leung, Shueng-Han Gary Chan, Oscar C. Au