Sciweavers

1506 search results - page 89 / 302
» Application Deployment in Virtual Networks Using the X-Bone
Sort
View
FTCS
1993
97views more  FTCS 1993»
13 years 10 months ago
Virtually-Synchronous Communication Based on a Weak Failure Suspector
Failure detectors (or, more accurately Failure Suspectors { FS) appear to be a fundamental service upon which to build fault-tolerant, distributed applications. This paper shows t...
André Schiper, Aleta Ricciardi
NPC
2004
Springer
14 years 2 months ago
The HKUST Frog Pond - A Case Study of Sensory Data Analysis
Many sensor network applications are data-centric, and data analysis plays an important role in these applications. However, it is a challenging task to find out what specific prob...
Wenwei Xue, Bingsheng He, Hejun Wu, Qiong Luo
EUROSYS
2006
ACM
14 years 6 months ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
ISPDC
2005
IEEE
14 years 2 months ago
A Component-based Software Infrastructure for Ubiquitous Computing
Multiplication of mobile devices and generalized use of wireless networks imply changes on the design and execution of distributed software applications targeting ubiquitous compu...
Areski Flissi, Christophe Gransart, Philippe Merle
IADIS
2003
13 years 10 months ago
Using Opnet Modeler to Analyse Galileo Communication Networks
Galileo is a European initiative to develop and deploy an independent global satellite-based navigation system. It consists of a Medium Earth Orbit sat ellite constellation transm...
Filipa Borrego, Juan-Antonio Martinez Rosique, Man...