The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
Fault injection, a critical aspect of testing robust systems, is often overlooked in the development of generalpurpose software. We believe this is due to the absence of easy-to-u...
It is critical to guarantee the reliability of serviceoriented applications. This is because they may employ remote Web Services as components, which may easily become unavailable...
In this work, a two-dimensional (2-D) representation of the hourly solar radiation data is proposed. The model enables accurate forecasting using image prediction methods. One year...
This paper describes measurement tests of Parallel Virtual File System (PVFS) and Network File System (NFS) over a commodity Linux cluster connected with Myrinet. PVFS stores a ï¬...