142
click to vote
HASE
15 years 7 months ago
2008 IEEE
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
121
click to vote
HASE
15 years 7 months ago
2008 IEEE
—In this paper, we investigate the transmission-power assignment problem for k-connected mobile ad hoc networks (MANETs), the problem of optimizing the lifetime of a MANET at a g...
141
click to vote
HASE
15 years 1 months ago
2008 IEEE
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
111
click to vote
HASE
15 years 7 months ago
2008 IEEE
With the increasing complexity in software and electronics in safety-critical systems new challenges to lower the costs and decrease time-to-market, while preserving high assuranc...
112
click to vote
HASE
15 years 2 months ago
2008 IEEE
Live migration provides transparent load-balancing and fault-tolerant mechanism for applications. When a Virtual Machine migrates among hosts residing in two networks, the network...
|