Sciweavers

144 search results - page 2 / 29
» Application-Level Isolation Using Data Inconsistency Detecti...
Sort
View
GLOBECOM
2008
IEEE
14 years 13 days ago
Friendly P2P: Application-Level Congestion Control for Peer-to-Peer Applications
Abstract—Peer-to-Peer (P2P) file sharing applications use multiple TCP connections between peers to transfer data. The aggressiveness and robustness of P2P technology remarkably...
YaNing Liu, Hongbo Wang, Yu Lin, Shiduan Cheng, Gw...
FLAIRS
2001
13 years 7 months ago
Detection of Inconsistencies in Complex Product Configuration Data Using Extended Propositional SAT-Checking
We present our consistency support tool BIS, an extension to the electronic product data management system (EPDMS) used at DaimlerChrysler AG to configure the Mercedes lines of pa...
Carsten Sinz, Andreas Kaiser, Wolfgang Küchli...
CN
2006
191views more  CN 2006»
13 years 6 months ago
Detection and diagnosis of data inconsistency failures in wireless sensor networks
Most fault-tolerant schemes for wireless sensor networks focus on power failures or crash faults. Little attention has been paid to the data inconsistency failures which occur whe...
Kuo-Feng Ssu, Chih-Hsun Chou, Hewijin Christine Ji...
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 6 months ago
Detecting Inconsistencies in Large Biological Networks with Answer Set Programming
Abstract. We introduce an approach to detecting inconsistencies in large biological networks by using Answer Set Programming. To this end, we build upon a recently proposed notion ...
Martin Gebser, Torsten Schaub, Sven Thiele, Philip...
ACSAC
2007
IEEE
14 years 9 days ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu