Sciweavers

347 search results - page 2 / 70
» Proactive Computing
Sort
View
132
Voted
GI
2005
Springer
15 years 7 months ago
On the Coverage of Proactive Security: An Addition to the Taxonomy of Faults
: Intrusion tolerance is a recent approach to deal with intentional and malicious failures. It combines the research on fault tolerance with the research on security, and relies on...
Timo Warns
122
Voted
AINTEC
2006
Springer
15 years 6 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha
111
Voted
DSN
2004
IEEE
15 years 6 months ago
Proactive Recovery in Distributed CORBA Applications
Unanticipated runtime events, such as faults, can lead to missed deadlines in real-time systems. While it is not always possible to know when a fault will occur, we can sometimes ...
Soila M. Pertet, Priya Narasimhan
73
Voted
ICPR
2006
IEEE
16 years 3 months ago
Embodied Proactive Human Interface "PICO-2"
Abstract-- We are conducting research on "Embodied Proactive Human Interface". The aim of this research is to develop a new human-friendly active interface based on two k...
Hiroaki Omasa, Rin-ichiro Taniguchi, Ryo Kurazume,...
138
Voted
TDSC
2010
172views more  TDSC 2010»
14 years 9 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...