174
click to vote
HASE
15 years 11 months ago
2008 IEEE
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
149
click to vote
HASE
15 years 11 months ago
2008 IEEE
—In this paper, we investigate the transmission-power assignment problem for k-connected mobile ad hoc networks (MANETs), the problem of optimizing the lifetime of a MANET at a g...
166
click to vote
HASE
15 years 4 months ago
2008 IEEE
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
136
click to vote
HASE
15 years 11 months ago
2008 IEEE
With the increasing complexity in software and electronics in safety-critical systems new challenges to lower the costs and decrease time-to-market, while preserving high assuranc...
133
click to vote
HASE
15 years 5 months ago
2008 IEEE
Live migration provides transparent load-balancing and fault-tolerant mechanism for applications. When a Virtual Machine migrates among hosts residing in two networks, the network...
|