Sciweavers

342 search results - page 58 / 69
» A planning based approach to failure recovery in distributed...
Sort
View
HOLOMAS
2007
Springer
14 years 2 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...
RTCSA
2008
IEEE
14 years 3 months ago
Providing Memory QoS Guarantees for Real-Time Applications
Nowadays, systems often integrate a variety of applications whose service requirements are heterogeneous. Consequently, systems must be able to concurrently serve applications whi...
Audrey Marchand, Patricia Balbastre, Ismael Ripoll...
CCR
2004
151views more  CCR 2004»
13 years 8 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
EDBT
2010
ACM
149views Database» more  EDBT 2010»
14 years 1 months ago
Statistics-based parallelization of XPath queries in shared memory systems
The wide availability of commodity multi-core systems presents an opportunity to address the latency issues that have plaqued XML query processing. However, simply executing multi...
Rajesh Bordawekar, Lipyeow Lim, Anastasios Kements...
PDP
2006
IEEE
14 years 2 months ago
A Hierarchical Consensus Protocol for Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) raise new challenges in designing protocols for solving the consensus problem. Among the others, how to design message efficient protocols so as to...
Weigang Wu, Jiannong Cao, Jin Yang, Michel Raynal