Sciweavers

1366 search results - page 166 / 274
» Modularizing Contexted Constraints
Sort
View
ICNP
2006
IEEE
15 years 9 months ago
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks
— Many multicast overlay networks maintain application-specific performance goals such as bandwidth, latency, jitter and loss rate by dynamically changing the overlay structure ...
Aaron Walters, David John Zage, Cristina Nita-Rota...
ACMSE
2006
ACM
15 years 9 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith
MINENET
2005
ACM
15 years 8 months ago
Topographical proximity for mining network alarm data
Increasingly powerful fault management systems are required to ensure robustness and quality of service in today’s networks. In this context, event correlation is of prime impor...
Ann Devitt, Joseph Duffin, Robert Moloney
SAC
2005
ACM
15 years 8 months ago
Limited assignments: a new cutoff strategy for incomplete depth-first search
In this paper, we propose an extension of three incomplete depthfirst search techniques, namely depth-bounded backtrack search, credit search, and iterative broadening, towards pr...
Roman Barták, Hana Rudová
EGC
2005
Springer
15 years 8 months ago
A Monitoring Architecture for Control Grids
Abstract. Monitoring systems are nowadays ubiquitous in complex environments, such as Grids. Their use is fundamental for performance evaluation, problem spotting, advanced debuggi...
Alexandru Iosup, Nicolae Tapus, Stéphane Vi...