— One practical limitation of structured peer-to-peer (P2P) networks is that they are frequently subject to Sybil attacks: malicious parties can compromise the network by generat...
Hosam Rowaihy, William Enck, Patrick McDaniel, Tom...
In this work, a two-dimensional (2-D) representation of the hourly solar radiation data is proposed. The model enables accurate forecasting using image prediction methods. One year...
Designing highly dependable systems requires a good understanding of failure characteristics. Unfortunately, little raw data on failures in large IT installations is publicly avai...
— Computing resource provisioning through the use of the Cloud computing paradigm has triggered revolutions in modern day computing. It is a new paradigm for deploying services o...
Jinhui Yao, Shiping Chen, Chen Wang, David Levy, J...
This article presents an optimization method used at the electric-motor design. The goal of the optimization was to find the geometrical parameter values that would generate the r...