Sciweavers

3108 search results - page 577 / 622
» An Approach to Incremental Design of Distributed Embedded Sy...
Sort
View
INFOCOM
2005
IEEE
14 years 3 months ago
On failure detection algorithms in overlay networks
— One of the key reasons overlay networks are seen as an excellent platform for large scale distributed systems is their resilience in the presence of node failures. This resilie...
Shelley Zhuang, Dennis Geels, Ion Stoica, Randy H....
NSPW
2004
ACM
14 years 3 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
WIDM
2004
ACM
14 years 3 months ago
XPath lookup queries in P2P networks
We address the problem of querying XML data over a P2P network. In P2P networks, the allowed kinds of queries are usually exact-match queries over file names. We discuss the exte...
Angela Bonifati, Ugo Matrangolo, Alfredo Cuzzocrea...
ISLPED
2003
ACM
85views Hardware» more  ISLPED 2003»
14 years 3 months ago
Low power coordination in wireless ad-hoc networks
Distributed wireless ad-hoc networks (DWANs) pose numerous technical challenges. Among them, two are widely considered as crucial: autonomous localized operation and minimization ...
Farinaz Koushanfar, Abhijit Davare, Dai Tho Nguyen...
JUCS
2008
186views more  JUCS 2008»
13 years 10 months ago
An Agent-Based Solution for Dynamic Supply Chain Management
: Supply chain management (SCM) deals with planning and coordinating activities such as material procurement, product assembly, and the distribution of manufactured products. This ...
Vedran Podobnik, Ana Petric, Gordan Jezic