Sciweavers

618 search results - page 24 / 124
» An Approach to Discover Dependencies between Service Operati...
Sort
View
AICT
2009
IEEE
144views Communications» more  AICT 2009»
15 years 4 months ago
Fingerprinting-Based Localization in WiMAX Networks Depending on SCORE Measurements
—Recently, localization in wireless networks has gained a lot of interest; especially after some of the most interesting positioning application areas have emerged in wireless co...
Mussa Bshara, Leo Van Biesen
TRIDENTCOM
2006
IEEE
15 years 3 months ago
The utility of perceptive communication between distant wireless nodes
CSMA-based MAC protocols require wireless nodes to share the transmission medium with other nodes that are within carriersensing (CS) range. Hence, operations that depend on and c...
Kimaya Sanzgiri, Ian D. Chakeres, Elizabeth M. Bel...
BDIM
2008
IEEE
205views Business» more  BDIM 2008»
15 years 4 months ago
Mining semantic relations using NetFlow
—Knowing the dependencies among computing assets and services provides insights into the computing and business landscape, therefore, facilitating low-risk timely changes in supp...
Alexandru Caracas, Andreas Kind, Dieter Gantenbein...
65
Voted
DSN
2004
IEEE
15 years 1 months ago
Experience with Evaluating Human-Assisted Recovery Processes
We describe an approach to quantitatively evaluating human-assisted failure-recovery tools and processes in the environment of modern Internet- and enterprise-class server systems...
Aaron B. Brown, Leonard Chung, William Kakes, Calv...
SRDS
1998
IEEE
15 years 1 months ago
AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects
Dependable distributed systems are difficult to build. This is particularly true if they have dependability requirements that change during the execution of an application, and are...
Michel Cukier, Jennifer Ren, Chetan Sabnis, David ...