Sciweavers

2951 search results - page 24 / 591
» Secure Distributed DNS
Sort
View
TSE
2008
92views more  TSE 2008»
15 years 4 months ago
Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems
Test adequacy criteria provide the engineer with guidance on how to populate test suites. While adequacy criteria have long been a focus of research, existing testing methods do no...
Matthew J. Rutherford, Antonio Carzaniga, Alexande...
JCM
2007
68views more  JCM 2007»
15 years 4 months ago
Cost-effective Product Traceability System Based on Widely Distributed Databases
— A cost-effective and easy way of introducing a product traceability system is to start from a small system and gradually extend it to a large-scale system. Traceability systems...
Shirou Wakayama, Yusuke Doi, Satoshi Ozaki, Atsush...
ICC
2009
IEEE
179views Communications» more  ICC 2009»
15 years 11 months ago
Distributed Power Control for Interference-Limited Cooperative Relay Networks
— In this paper, a distributed power control algorithm is proposed for wireless relay networks in interference-limited environments. The objective is to minimize the total transm...
Sheng Zhou, Hongda Xiao, Zhisheng Niu
DEXAW
2006
IEEE
153views Database» more  DEXAW 2006»
15 years 10 months ago
Capturing and Using the Operational Semantics of Large Distributed Systems: Sharing Common Application Requirements in Virtual O
Organisations may wish to use a standards-defined distributed system in a global sense but also have a requirement for non-standard local behaviour. This reflects the production...
Nickolas J. G. Falkner, Paul D. Coddington, Andrew...
NSDI
2004
15 years 5 months ago
Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays
Structured peer-to-peer hash tables provide decentralization, self-organization, failure-resilience, and good worst-case lookup performance for applications, but suffer from high ...
Venugopalan Ramasubramanian, Emin Gün Sirer