169
Voted
HASE
15 years 10 months ago
2008 IEEE
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
141
click to vote
HASE
15 years 10 months ago
2008 IEEE
—In this paper, we investigate the transmission-power assignment problem for k-connected mobile ad hoc networks (MANETs), the problem of optimizing the lifetime of a MANET at a g...
162
Voted
HASE
15 years 3 months ago
2008 IEEE
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
131
Voted
HASE
15 years 10 months ago
2008 IEEE
With the increasing complexity in software and electronics in safety-critical systems new challenges to lower the costs and decrease time-to-market, while preserving high assuranc...
132
Voted
HASE
15 years 4 months ago
2008 IEEE
Live migration provides transparent load-balancing and fault-tolerant mechanism for applications. When a Virtual Machine migrates among hosts residing in two networks, the network...
|