Sciweavers

1362 search results - page 157 / 273
» Model Checking Large Network Protocol Implementations
Sort
View
ACISICIS
2009
IEEE
15 years 10 months ago
BackupIT: An Intrusion-Tolerant Cooperative Backup System
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should...
Sérgio Raymundo Loest, Marcelo Cheminn Madr...
HICSS
2009
IEEE
130views Biometrics» more  HICSS 2009»
15 years 10 months ago
A Systematic Approach to Improve Communication for Emergency Response
The importance of communication, information sharing and interoperability in an emergency response scenario have risen recently based on the frequency of disasters throughout the ...
Raheleh B. Dilmaghani, Ramesh R. Rao
HPDC
2002
IEEE
15 years 8 months ago
IQ-RUDP: Coordinating Application Adaptation with Network Transport
Our research addresses the efficient transfer of large data across wide-area networks, focusing on applications like remote visualization and real-time collaboration. To attain h...
Qi He, Karsten Schwan
WSC
2007
15 years 5 months ago
A toolbox for simulation-based optimization of supply chains
In this paper we present a general framework for simulating and optimizing the operational decisions in a supply chain network. We developed a supply chain network library for the...
Christian Almeder, Margaretha Preusser
CCR
2006
116views more  CCR 2006»
15 years 3 months ago
The devil and packet trace anonymization
Releasing network measurement data--including packet traces-to the research community is a virtuous activity that promotes solid research. However, in practice, releasing anonymiz...
Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee