Sciweavers

3751 search results - page 569 / 751
» Events in security protocols
Sort
View
90
Voted
SAC
2010
ACM
15 years 7 months ago
Fast, flexible, and highly resilient genuine fifo and causal multicast algorithms
We study the fifo and causal multicast problem, two group-communication abstractions that deliver messages in an order consistent with their context. With fifo multicast, the co...
Nicolas Schiper, Fernando Pedone
IPSN
2009
Springer
15 years 7 months ago
Application-informed radio duty-cycling in a re-taskable multi-user sensing system
As sensor networks mature, there will be an increasing need for re-usable, dynamically taskable software systems that support multiple concurrent applications. In this paper, we c...
Omprakash Gnawali, Jongkeun Na, Ramesh Govindan
ICECCS
2009
IEEE
161views Hardware» more  ICECCS 2009»
15 years 7 months ago
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware
Distributed information systems are critical to the functioning of many businesses; designing them to be dependable is a challenging but important task. We report our experience i...
Jeremy Bryans, John S. Fitzgerald, Alexander Roman...
134
Voted
ICMCS
2008
IEEE
158views Multimedia» more  ICMCS 2008»
15 years 7 months ago
Video quality assessment and comparative evaluation of peer-to-peer video streaming systems
We design a test methodology to analyze in detail the video quality received at each peer in a peer-to-peer (P2P) video streaming system. The metrics that we employ at each peer i...
Aditya Mavlankar, Pierpaolo Baccichet, Bernd Girod...
90
Voted
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
15 years 7 months ago
Introducing Executable Product Models for the Service Industry
In these days, companies need highly flexible processes to deal with changing environments and competitors. Using traditional process models that have to be modeled in all detail...
Markus Kress, Joachim Melcher, Detlef Seese