Sciweavers

347 search results - page 2 / 70
» Proactive Computing
Sort
View
GI
2005
Springer
13 years 10 months ago
On the Coverage of Proactive Security: An Addition to the Taxonomy of Faults
: Intrusion tolerance is a recent approach to deal with intentional and malicious failures. It combines the research on fault tolerance with the research on security, and relies on...
Timo Warns
AINTEC
2006
Springer
13 years 9 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha
DSN
2004
IEEE
13 years 9 months ago
Proactive Recovery in Distributed CORBA Applications
Unanticipated runtime events, such as faults, can lead to missed deadlines in real-time systems. While it is not always possible to know when a fault will occur, we can sometimes ...
Soila M. Pertet, Priya Narasimhan
ICPR
2006
IEEE
14 years 6 months ago
Embodied Proactive Human Interface "PICO-2"
Abstract-- We are conducting research on "Embodied Proactive Human Interface". The aim of this research is to develop a new human-friendly active interface based on two k...
Hiroaki Omasa, Rin-ichiro Taniguchi, Ryo Kurazume,...
TDSC
2010
172views more  TDSC 2010»
13 years 21 hour ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...