Sciweavers

881 search results - page 89 / 177
» A Model of Tolerance
Sort
View
DSN
2000
IEEE
15 years 2 months ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
IWSSD
2000
IEEE
15 years 2 months ago
An Approach to Preserving Sufficient Correctness in Open Resource Coalitions
Most software that most people use most of the time needs only moderate assurance of fitness for its intended purpose. Unlike high-assurance software, where the severe consequence...
Orna Raz, Mary Shaw
SIGMETRICS
1999
ACM
15 years 2 months ago
NFS Sensitivity to High Performance Networks
This paper examines NFS sensitivity to performance characteristics of emerging networks. We adopt an unusual method of inserting controlled delays into live systems to measure sen...
Richard P. Martin, David E. Culler
MASCOTS
2007
14 years 11 months ago
Analysis of Core-Assisted Routing in Opportunistic Networks
Abstract— Opportunistic Networks (ONs) are a newly emerging type of Delay Tolerant Network (DTN) systems that opportunistically exploit unplanned contacts among nodes to share in...
Muhammad Abdulla, Robert Simon
ICAI
2004
14 years 11 months ago
Integrating Robotic Sensor and Effector Capabilities with Multi-agent Organizations
Robots possess many effectors and sensors of various capability. It is often difficult, not only to integrate these numerous capabilities, but also to organize them to accomplish ...
Eric T. Matson, Scott A. DeLoach