It is vital to achieve a disaster recovery system that allows a backup site to take over a primary site’s IT services while the primary site is down. We propose a flexible repli...
"The state of information security as a whole is a disaster, a train wreck". This view is given by Forte and Power (2007) describing the state of information security to...
Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Da...
In this article, a new model to simulate different failure propagation scenarios in GMPLS-based networks is proposed. Several types of failures and malfunctions may spread along t...
Eusebi Calle, J. Ripoll, J. Segovia, Pere Vil&agra...
—Data aggregation, as a primitive communication task in wireless networks, can reduce the communication complexity. However, in-network aggregation usually brings an unavoidable ...
We offer a technique to partition a centralized control-flow graph to obtain distributed control in the context of asynchronous highlevel synthesis. The technique targets Huffman-...
Prabhakar Kudva, Ganesh Gopalakrishnan, Hans M. Ja...