Sciweavers

441 search results - page 76 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
JIT
2004
Springer
131views Database» more  JIT 2004»
15 years 5 months ago
Testing of Service-Oriented Architectures - A Practical Approach
Service Oriented Architectures (SOAs) have recently emerged as a new promising paradigm for supporting distributed computing. Web services, as well as integration-packages relying ...
Schahram Dustdar, Stephan Haslinger
ICDE
2007
IEEE
167views Database» more  ICDE 2007»
16 years 1 months ago
DSphere: A Source-Centric Approach to Crawling, Indexing and Searching the World Wide Web
We describe DSPHERE1 - a decentralized system for crawling, indexing, searching and ranking of documents in the World Wide Web. Unlike most of the existing search technologies tha...
Bhuvan Bamba, Ling Liu, James Caverlee, Vaibhav Pa...
PERCOM
2006
ACM
15 years 11 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
ASAP
2008
IEEE
142views Hardware» more  ASAP 2008»
15 years 6 months ago
Managing multi-core soft-error reliability through utility-driven cross domain optimization
As semiconductor processing technology continues to scale down, managing reliability becomes an increasingly difficult challenge in high-performance microprocessor design. Transie...
Wangyuan Zhang, Tao Li
ATAL
2010
Springer
15 years 25 days ago
Honor among thieves: collusion in multi-unit auctions
We consider collusion in multi-unit auctions where the allocation and payments are determined using the VCG mechanism. We show how collusion can increase the utility of the collud...
Yoram Bachrach