Supporting high availability by checkpointing and switching to a backup upon failure of a primary has a cost. Trade-off studies help system architects to decide whether higher ava...
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
Abstract Multi-agent cooperation can in several cases be used in order to mitigate problems relating to task sharing within physical processes. In this paper we apply agent based s...
Christian Johansson, Fredrik Wernstedt, Paul David...
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
IBM Enhanced Audio Conferencing (IEAC) is a VoIPbased audio conferencing system that, like several other systems, provides a visualization showing who is present and their states ...
Xianghua Ding, Thomas Erickson, Wendy A. Kellogg, ...