Sciweavers

3686 search results - page 548 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
DBKDA
2010
IEEE
127views Database» more  DBKDA 2010»
13 years 6 months ago
Failure-Tolerant Transaction Routing at Large Scale
—Emerging Web2.0 applications such as virtual worlds or social networking websites strongly differ from usual OLTP applications. First, the transactions are encapsulated in an AP...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
ICSE
2004
IEEE-ACM
14 years 8 months ago
An Experimental, Pluggable Infrastructure for Modular Configuration Management Policy Composition
Building a configuration management (CM) system is a difficult endeavor that regularly requires tens of thousands of lines of code to be written. To reduce this effort, several ex...
Ronald van der Lingen, André van der Hoek
SKG
2006
IEEE
14 years 2 months ago
Caribbean/Q: A Massively Multi-Agent Platform with Scenario Description Language
Making a truly useful massively multi-agent system is difficult since the actions of the full ensemble of agents cannot be controlled by designing just one agent. It is critical ...
Yuu Nakajima, Hironori Shiina, Shohei Yamane, Hiro...
CIDR
2011
224views Algorithms» more  CIDR 2011»
12 years 11 months ago
Transactional Intent
Data state in a data management system such as a database is the result of the transactions performed on that data management system. Approaches such as single-message transaction...
Shel Finkelstein, Thomas Heinzel, Rainer Brendle, ...
GLOBECOM
2006
IEEE
14 years 2 months ago
Wavelet-based Detection of DoS Attacks
— Automated detection of anomalies in network traffic is an important and challenging task. In this work we propose an automated system to detect volume-based anomalies in netwo...
Alberto Dainotti, Antonio Pescapè, Giorgio ...