Sciweavers

1506 search results - page 89 / 302
» Application Deployment in Virtual Networks Using the X-Bone
Sort
View
110
Voted
FTCS
1993
97views more  FTCS 1993»
15 years 4 months ago
Virtually-Synchronous Communication Based on a Weak Failure Suspector
Failure detectors (or, more accurately Failure Suspectors { FS) appear to be a fundamental service upon which to build fault-tolerant, distributed applications. This paper shows t...
André Schiper, Aleta Ricciardi
148
Voted
NPC
2004
Springer
15 years 9 months ago
The HKUST Frog Pond - A Case Study of Sensory Data Analysis
Many sensor network applications are data-centric, and data analysis plays an important role in these applications. However, it is a challenging task to find out what specific prob...
Wenwei Xue, Bingsheng He, Hejun Wu, Qiong Luo
147
Voted
EUROSYS
2006
ACM
16 years 18 days ago
Practical taint-based protection using demand emulation
Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
121
Voted
ISPDC
2005
IEEE
15 years 9 months ago
A Component-based Software Infrastructure for Ubiquitous Computing
Multiplication of mobile devices and generalized use of wireless networks imply changes on the design and execution of distributed software applications targeting ubiquitous compu...
Areski Flissi, Christophe Gransart, Philippe Merle
127
Voted
IADIS
2003
15 years 4 months ago
Using Opnet Modeler to Analyse Galileo Communication Networks
Galileo is a European initiative to develop and deploy an independent global satellite-based navigation system. It consists of a Medium Earth Orbit sat ellite constellation transm...
Filipa Borrego, Juan-Antonio Martinez Rosique, Man...