Sciweavers

1268 search results - page 114 / 254
» Verifying distributed systems: the operational approach
Sort
View
HOTOS
1999
IEEE
15 years 2 months ago
The Case for Better Throughput Estimation
A Web proxy must accurately predict network performance between itself and its servers and clients in order to make good distillation decisions. In this paper, we show that the cu...
Brian Noble, Li Li, Atul Prakash
CAV
2009
Springer
206views Hardware» more  CAV 2009»
15 years 10 months ago
D-Finder: A Tool for Compositional Deadlock Detection and Verification
D-Finder tool implements a compositional method for the verification of component-based systems described in BIP language encompassing multi-party interaction. For deadlock detecti...
Saddek Bensalem, Marius Bozga, Thanh-Hung Nguyen, ...
MIDDLEWARE
2009
Springer
15 years 2 months ago
How to Keep Your Head above Water While Detecting Errors
Today’s distributed systems need runtime error detection to catch errors arising from software bugs, hardware errors, or unexpected operating conditions. A prominent class of err...
Ignacio Laguna, Fahad A. Arshad, David M. Grothe, ...
ICUMT
2009
14 years 7 months ago
Discovery of Physical Neighbors for P2P 3D streaming
Abstract-- Many peer-to-peer-based virtual environment (P2PVE) solutions have been proposed recently to improve the scalability of distributed virtual environment (VE) systems. By ...
Chang-Hua Wu, Shun-Yun Hu, Li-Ming Tseng
DBISP2P
2003
Springer
105views Database» more  DBISP2P 2003»
15 years 3 months ago
Distributed Queries and Query Optimization in Schema-Based P2P-Systems
Databases have employed a schema-based approach to store and retrieve structured data for decades. For peer-to-peer (P2P) networks, similar approaches are just beginning to emerge,...
Ingo Brunkhorst, Hadhami Dhraief, Alfons Kemper, W...