Sciweavers

2436 search results - page 319 / 488
» Comonadic Notions of Computation
Sort
View
IWCMC
2010
ACM
15 years 9 months ago
Reconstruction of malicious internet flows
We describe a general-purpose distributed system capable of traceback of malicious flow trajectories in the wide area despite possible source IP spoofing. Our system requires th...
Omer Demir, Bilal Khan, Ala I. Al-Fuqaha
ACSC
2002
IEEE
15 years 9 months ago
Bandwidth Reservation Strategies for Mobility Support of Wireless Connections with QoS Guarantees
This paper examines QoS guarantees for bandwidth in mobile wireless networks, with a focus on reducing dropped connections on handoff. We can achieve this by reserving bandwidth f...
R. Hutchens, S. Singh
DSN
2002
IEEE
15 years 9 months ago
Reducing Recovery Time in a Small Recursively Restartable System
We present ideas on how to structure software systems for high availability by considering MTTR/MTTF characteristics of components in addition to the traditional criteria, such as...
George Candea, James Cutler, Armando Fox, Rushabh ...
EDOC
2002
IEEE
15 years 9 months ago
An Architecture and a Process for Implementing Distributed Collaborations
Collaborations (between objects) are increasingly being recognized as fundamental building blocks to structure object-oriented design, and they have made their way into UML. But v...
Eric Cariou, Antoine Beugnard, Jean-Marc Jé...
ICDCSW
2002
IEEE
15 years 9 months ago
Subscription Summaries for Scalability and Efficiency in Publish/Subscribe Systems
A key issue when designing and implementing largescale publish/subscribe systems is how to efficiently propagate subscriptions among the brokers of the system. Brokers require thi...
Peter Triantafillou, Andreas A. Economides