This paper provides an overview of fault injection techniques and their applicability to testing SOAP RPC based web service systems. We also give a detailed example of the WS-FIT ...
Recently distributed hash table (DHT) mechanisms have been proposed to manage data in very large, structured peer-to-peer (P2P) systems. DHT algorithms provide efficient exact-mat...
A key challenge in ubiquitous computing is how to manage ambient information about the environment where a variety of devices appear. Traditional capability descriptions are inadeq...
In this paper we describe the process of mining complex relationships in spatial databases using the Maximal Participation Index (maxPI), which has a property of discovering low s...
Bavani Arunasalam, Sanjay Chawla, Pei Sun, Robert ...
The current commercial anti-virus software detects a virus only after the virus has appeared and caused damage. Motivated by the standard signature-based technique for detecting v...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...