Current post-mortem cyber-forensic techniques may cause significant disruption to the evidence gathering process by breaking active network connections and unmounting encrypted di...
Ellick Chan, Shivaram Venkataraman, Francis M. Dav...
Gossip-based information dissemination protocols are considered easy to deploy, scalable and resilient to network dynamics. They are also considered highly flexible, namely tunab...
Abstract. This paper documents the development of three autonomous stocktrading agents within the framework of the Penn Exchange Simulator (PXS), a novel stock-trading simulator th...
High availability is a critical feature for service clusters and cloud computing, and is often considered more valuable than performance. One commonly used technique to enhance the...
As dependence on the World Wide Web continues to grow, so does the need for businesses to have quantitative measures of the client perceived response times of their Web services. ...