Sciweavers

3178 search results - page 14 / 636
» Survivability Analysis of Networked Systems
Sort
View
DEBS
2009
ACM
15 years 4 months ago
Soft state in publish/subscribe
Building survivable content-based publish/subscribe systems is difficult. Every node in a distributed publish/subscribe system stores a significant amount of routing state which ...
Zbigniew Jerzak, Christof Fetzer
73
Voted
AICT
2005
IEEE
117views Communications» more  AICT 2005»
15 years 3 months ago
Managing Pi-resources in 4G Wireless Systems: The Opportunistic Way
Integration of different radio access networks will become a reality in a near future. Our interworking architecture assumes a ubiquitous primary network (the cellular one) and se...
Pedro Sobral, Luis Bernardo, Paulo Pinto
76
Voted
PDCAT
2009
Springer
15 years 4 months ago
Analytical Study of Adversarial Strategies in Cluster-based Overlays
Abstract—Awerbuch and Scheideler have shown that peerto-peer overlays networks can survive Byzantine attacks only if malicious nodes are not able to predict what will be the topo...
Emmanuelle Anceaume, Francisco V. Brasileiro, Roma...
WCRE
2010
IEEE
14 years 7 months ago
Studying the Impact of Clones on Software Defects
—There are numerous studies that examine whether or not cloned code is harmful to software systems. Yet, few of them study which characteristics of cloned code in particular lead...
Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, B...
144
Voted
ASIASIM
2004
Springer
15 years 2 months ago
A Security Risk Analysis Model for Information Systems
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
Hoh Peter In, Young-Gab Kim, Taek Lee, Chang-Joo M...