Sciweavers

851 search results - page 94 / 171
» Managing (Requirements) Evolutions of High Assurance Systems
Sort
View
CIDR
2003
150views Algorithms» more  CIDR 2003»
15 years 3 months ago
The Database Machine: Old Story, New Slant?
Current database management system technology is not well equipped to provide adequate support for what has been deemed the 3rd wave of computing -- Ubiquitous Computing. Such app...
Julie A. McCann
DSS
2000
105views more  DSS 2000»
15 years 1 months ago
Dynamic behavior of differential pricing and quality of service options for the internet
Abstract. The simple model on which the Internet has operated, with all packets treated equally, and charges only for access links to the network, has contributed to its explosive ...
Peter C. Fishburn, Andrew M. Odlyzko
PODC
2010
ACM
15 years 5 months ago
Adaptive system anomaly prediction for large-scale hosting infrastructures
Large-scale hosting infrastructures require automatic system anomaly management to achieve continuous system operation. In this paper, we present a novel adaptive runtime anomaly ...
Yongmin Tan, Xiaohui Gu, Haixun Wang
EUROMICRO
2009
IEEE
15 years 8 months ago
The Cycle of Trust in Mixed Service-Oriented Systems
—Many collaboration platforms are realized as service-oriented systems enabling flexible compositions of services and support of interactions. Interactions between entities in s...
Florian Skopik, Daniel Schall, Schahram Dustdar
P2P
2005
IEEE
112views Communications» more  P2P 2005»
15 years 7 months ago
Randomized Protocols for Duplicate Elimination in Peer-to-Peer Storage Systems
Distributed peer-to-peer systems rely on voluntary participation of peers to effectively manage a storage pool. In such systems, data is generally replicated for performance and a...
Ronaldo A. Ferreira, Murali Krishna Ramanathan, An...