Sciweavers

3686 search results - page 118 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
WETICE
2003
IEEE
14 years 3 months ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
WISE
2000
Springer
14 years 2 months ago
Object-Oriented Mediator Queries to XML Data
The mediator/wrapper approach is used to integrate data from different databases and other data sources by introducing a middleware virtual database that provides high level abstr...
Hui Lin, Tore Risch, Timour Katchaounov
FTCS
1993
97views more  FTCS 1993»
13 years 11 months ago
Virtually-Synchronous Communication Based on a Weak Failure Suspector
Failure detectors (or, more accurately Failure Suspectors { FS) appear to be a fundamental service upon which to build fault-tolerant, distributed applications. This paper shows t...
André Schiper, Aleta Ricciardi
CSREAEEE
2006
129views Business» more  CSREAEEE 2006»
13 years 11 months ago
Computer Science Exercises in a Virtual University
Abstract--In distance teaching, direct feedback to the students is difficult to give, but crucial for their learning success. The system Asterix was developed in order to support t...
Manfred Widera, Barbara Messing, Gabriele Kern-Isb...
SICHERHEIT
2010
13 years 8 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...