Sciweavers

4326 search results - page 691 / 866
» A Model for Process Service Interaction
Sort
View
149
Voted
TDSC
2010
157views more  TDSC 2010»
14 years 10 months ago
On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures
Network survivability is the ability of a network keeping connected under failures and attacks, which is a fundamental issue to the design and performance evaluation of wireless ad...
Fei Xing, Wenye Wang
107
Voted
ARESEC
2011
76views more  ARESEC 2011»
14 years 3 months ago
A Complexity Based Forensic Analysis of the Trojan Horse Defence
—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
Richard E. Overill, Jantje A. M. Silomon
219
Voted
ICDE
1996
IEEE
141views Database» more  ICDE 1996»
16 years 4 months ago
Data Replication in Mariposa
The Mariposa distributed data manager uses an economic model for managing the allocation of both storage objects and queries to servers. In this paper, we present extensions to th...
Jeff Sidell, Paul M. Aoki, Adam Sah, Carl Staelin,...
126
Voted
DSN
2008
IEEE
15 years 10 months ago
Automatic security assessment of critical cyber-infrastructures
This research investigates the automation of security assessment of the static and dynamic properties of cyberinfrastructures, with emphasis on the electrical power grid. We descr...
Zahid Anwar, Ravinder Shankesi, Roy H. Campbell
164
Voted
TKDE
2008
169views more  TKDE 2008»
15 years 3 months ago
A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems
Data stream management systems need to control their resources adaptively since stream characteristics and query workload may vary over time. In this paper we investigate an approa...
Michael Cammert, Jürgen Krämer, Bernhard...