Sciweavers

3370 search results - page 536 / 674
» Adding Networks
Sort
View
DSN
2004
IEEE
15 years 8 months ago
Assured Reconfiguration of Embedded Real-Time Software
It is often the case that safety-critical systems have to be reconfigured during operation because of issues such as changes in the system's operating environment or the fail...
Elisabeth A. Strunk, John C. Knight
DSOM
2006
Springer
15 years 8 months ago
Detecting Bottleneck in n-Tier IT Applications Through Analysis
As the complexity of large-scale enterprise applications increases, providing performance verification through staging becomes an important part of reducing business risks associat...
Gueyoung Jung, Galen S. Swint, Jason Parekh, Calto...
126
Voted
TNC
2004
125views Education» more  TNC 2004»
15 years 6 months ago
Performance Analysis of Multicast Mobility in a Hierarchical Mobile IP Proxy Environment
Mobility support in IPv6 networks is ready for release as an RFC, stimulating major discussions on improvements to meet real-time communication requirements. Sprawling hot spots o...
Thomas C. Schmidt, Matthias Wählisch
CCIA
2009
Springer
15 years 6 months ago
2-LAMA Architecture vs. BitTorrent Protocol in a Peer-to-Peer Scenario
Abstract. In this paper, we review our Multi-Agent System (MAS) architecture (2LAMA) proposed to assist existing MAS. This architecture consists of two levels: the conventional MAS...
Jordi Campos Miralles, Maite López-Sá...
PERCOM
2010
ACM
15 years 3 months ago
A flexible context stabilization approach for self-adaptive application
Abstract—Pervasive applications are characterized by variations in their context of execution. Their correct behavior requires continuous adaptations, accordingly to changes obse...
Russel Nzekwa, Romain Rouvoy, Lionel Seinturier