Sciweavers

166 search results - page 26 / 34
» A Software Fault Tree Approach to Requirements Analysis of a...
Sort
View
WPES
2006
ACM
14 years 2 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 8 months ago
Infinity-Norm Sphere-Decoding
Abstract--Promising approaches for efficient detection in multiple-input multiple-output (MIMO) wireless systems are based on sphere-decoding (SD). The conventional (and optimum) n...
Dominik Seethaler, Helmut Bölcskei
COMPSAC
2005
IEEE
13 years 10 months ago
A Low-Latency Checkpointing Scheme for Mobile Computing Systems
Fault-tolerant mobile computing systems have different requirements and restrictions, not taken into account by conventional distributed systems. This paper presents a coordinate...
Guohui Li, LihChyun Shu
COMPSAC
2010
IEEE
13 years 6 months ago
Using Load Tests to Automatically Compare the Subsystems of a Large Enterprise System
Enterprise systems are load tested for every added feature, software updates and periodic maintenance to ensure that the performance demands on system quality, availability and res...
Haroon Malik, Bram Adams, Ahmed E. Hassan, Parmind...
EUROSYS
2007
ACM
14 years 5 months ago
Sweeper: a lightweight end-to-end system for defending against fast worms
The vulnerabilities which plague computers cause endless grief to users. Slammer compromised millions of hosts in minutes; a hit-list worm would take under a second. Recently prop...
Joseph Tucek, James Newsome, Shan Lu, Chengdu Huan...