Sciweavers

5107 search results - page 959 / 1022
» Design Issue Of ECTST
Sort
View
JPDC
2006
112views more  JPDC 2006»
14 years 9 months ago
CEFT: A cost-effective, fault-tolerant parallel virtual file system
The vulnerability of computer nodes due to component failures is a critical issue for cluster-based file systems. This paper studies the development and deployment of mirroring in...
Yifeng Zhu, Hong Jiang
ENTCS
2007
104views more  ENTCS 2007»
14 years 9 months ago
A Formal Framework for Web Services Coordination
Recently the term Web Services choreography has been introduced to address some issues related to Web Services composition and coordination. Several proposals for describing chore...
Claudio Guidi, Roberto Lucchi, Manuel Mazzara
ENTCS
2007
140views more  ENTCS 2007»
14 years 9 months ago
Secured Information Flow for Asynchronous Sequential Processes
We present in this article a precise security model for data confidentiality in the framework of ASP (Asynchronous Sequential Processes). ASP is based on active objects, asynchro...
Isabelle Attali, Denis Caromel, Ludovic Henrio, Fe...
JSAC
2006
139views more  JSAC 2006»
14 years 9 months ago
ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks
Multihop wireless mesh networks (WMNs) are finding ever-growing acceptance as a viable and effective solution to ubiquitous broadband Internet access. This paper addresses the secu...
Yanchao Zhang, Yuguang Fang
JSAC
2006
111views more  JSAC 2006»
14 years 9 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras