Sciweavers

141 search results - page 17 / 29
» Intrusion Tolerance in Wireless Environments: An Experimenta...
Sort
View
PERCOM
2009
ACM
15 years 7 months ago
Concurrent Event Detection for Asynchronous Consistency Checking of Pervasive Context
—Contexts, the pieces of information that capture the characteristics of computing environments, are often inconsistent in the dynamic and uncertain pervasive computing environme...
Yu Huang 0002, Xiaoxing Ma, Jiannong Cao, XianPing...
MIDDLEWARE
2004
Springer
15 years 5 months ago
A context-aware middleware for applications in mobile Ad Hoc environments
Novel ubiquitous computing applications such as intelligent vehicles, smart buildings, and traffic management require special properties that traditional computing applications d...
Carl-Fredrik Sørensen, Maomao Wu, Thirunavu...
CF
2009
ACM
14 years 10 months ago
High accuracy failure injection in parallel and distributed systems using virtualization
Emulation sits between simulation and experimentation to complete the set of tools available for software designers to evaluate their software and predict behavior under condition...
Thomas Hérault, Thomas Largillier, Sylvain ...
102
Voted
RSFDGRC
2005
Springer
151views Data Mining» more  RSFDGRC 2005»
15 years 6 months ago
DIXER - Distributed Executor for Rough Set Exploration System
We present the Distributed Executor for RSES (DIXER) which is a supplementary software for the Rough Set Exploration System (RSES). It takes an advantage of grid computing paradigm...
Jan G. Bazan, Rafal Latkowski, Marcin S. Szczuka
SRDS
1998
IEEE
15 years 4 months ago
Optimization of a Real-Time Primary-Backup Replication Service
The primary-backup replication model is one of the commonly adopted approaches to providing fault tolerant data services. Its extension to the real-time environment, however, impo...
Hengming Zou, Farnam Jahanian