— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...
RAID architectures have been used for more than two decades to recover data upon disk failures. Disk failure is just one of the many causes of damaged data. Data can be damaged by...
Abstract. While Web Services ensure interoperability and extensibility for networked applications, they also complicate the deployment of highly collaborative systems, such as virt...
Qi Huang, Daniel A. Freedman, Ymir Vigfusson, Ken ...
Describing an application as a simple composition of services allows advanced features that exploit different platforms to be conceived e formalized at a high abstraction level. S...
We present the development and experimentation of a distributed system for pervasive video communication on gigabit networks. We have implemented an event-based control mechanism f...
Yan Grunenberger, Phuong Hoang Nguyen, Gilles Priv...