This paper shows that, in an environment where we do not bound the number of faulty processes, the class P of Perfect failure detectors is the weakest (among realistic failure det...
In Marc Weiser’s vision of ubiquitous computing, users are located in an environment with potentially thousands of computers around them. Many capabilities of these smart device...
A key issue when designing and implementing largescale publish/subscribe systems is how to efficiently propagate subscriptions among the brokers of the system. Brokers require thi...
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
— We consider the problem of distributing high-quality video signals over IP multicast in large Local Area Networks (LANs), under realtime delay constraints, and with software-on...
Sergio D. Servetto, Rohit Puri, Jean-Paul Wagner, ...