Sciweavers

2587 search results - page 497 / 518
» Intrusion Tolerant Systems
Sort
View
IMC
2003
ACM
15 years 5 months ago
Tomography-based overlay network monitoring
Overlay network monitoring enables distributed Internet applications to detect and recover from path outages and periods of degraded performance within seconds. For an overlay net...
Yan Chen, David Bindel, Randy H. Katz
INFOCOM
2002
IEEE
15 years 4 months ago
On Multiple Description Streaming with Content Delivery Networks
Abstract— CDNs have been widely used to provide low latency, scalability, fault tolerance, and load balancing for the delivery of web content and more recently streaming media. W...
John G. Apostolopoulos, Tina Wong, Susie J. Wee, D...
EUROGP
2009
Springer
105views Optimization» more  EUROGP 2009»
15 years 4 months ago
Quantum Circuit Synthesis with Adaptive Parameters Control
The contribution presented herein proposes an adaptive genetic algorithm applied to quantum logic circuit synthesis that, dynamically adjusts its control parameters. The adaptation...
Cristian Ruican, Mihai Udrescu, Lucian Prodan, Mir...
ICPP
1999
IEEE
15 years 4 months ago
Coherence-Centric Logging and Recovery for Home-Based Software Distributed Shared Memory
The probability of failures in software distributed shared memory (SDSM) increases as the system size grows. This paper introduces a new, efficient message logging technique, call...
Angkul Kongmunvattana, Nian-Feng Tzeng
ISER
1995
Springer
131views Robotics» more  ISER 1995»
15 years 3 months ago
Stiffness Isn't Everything
Most robot designers make the mechanical interface between an actuator and its load as stiff as possible[9][10]. This makes sense in traditional position-controlled systems, becau...
Gill A. Pratt, Matthew M. Williamson, Peter Dilwor...