The same network infrastructure that is essential for the operation of today’s high valued distributed systems can also be misused by malicious attackers. Experience shows that ...
Michael Atighetchi, Paul Rubel, Partha Pratim Pal,...
Mobile ad hoc wireless networks are generating novel interests in mobile computing. The dynamism in network topology has thrown up multifarious issues, requiring a fresh look into ...
Krishna Paul, Romit Roy Choudhury, Somprakash Band...
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
: With the ever-increasing demands on server applications, reliability is of paramount importance. Often these services are implemented using a distributed server cluster architect...
Survivability is a crucial property for computer systems that support critical infrastructures of our society. A variety of survivability definitions and evaluation methods for t...