134
click to vote
HASE
15 years 7 months ago
2008 IEEE
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
115
Voted
HASE
15 years 7 months ago
2008 IEEE
—In this paper, we investigate the transmission-power assignment problem for k-connected mobile ad hoc networks (MANETs), the problem of optimizing the lifetime of a MANET at a g...
134
click to vote
HASE
15 years 19 days ago
2008 IEEE
Designing safety-critical systems is a complex process, and especially when the design is carried out at different f abstraction where the correctness of the design at one level i...
104
click to vote
HASE
15 years 7 months ago
2008 IEEE
With the increasing complexity in software and electronics in safety-critical systems new challenges to lower the costs and decrease time-to-market, while preserving high assuranc...
103
Voted
HASE
15 years 1 months ago
2008 IEEE
Live migration provides transparent load-balancing and fault-tolerant mechanism for applications. When a Virtual Machine migrates among hosts residing in two networks, the network...
|