Sciweavers

2357 search results - page 428 / 472
» Computing Refactorings of Behavior Models
Sort
View
DSN
2005
IEEE
14 years 2 months ago
How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?
Fault-tolerant protocols, asynchronous and synchronous alike, make stationary fault assumptions: only a fraction f of the total n nodes may fail. Whilst a synchronous protocol is ...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
CN
2008
98views more  CN 2008»
13 years 8 months ago
Description and simulation of dynamic mobility networks
During the last decade, the study of large scale complex networks has attracted a substantial amount of attention and works from several domains: sociology, biology, computer scie...
Antoine Scherrer, Pierre Borgnat, Eric Fleury, Jea...
SOSP
2003
ACM
14 years 5 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
HRI
2009
ACM
14 years 3 months ago
Providing route directions: design of robot's utterance, gesture, and timing
Providing route directions is a complicated interaction. Utterances are combined with gestures and pronounced with appropriate timing. This study proposes a model for a robot that...
Yusuke Okuno, Takayuki Kanda, Michita Imai, Hirosh...
ICAC
2009
IEEE
14 years 3 months ago
AdaptGuard: guarding adaptive systems from instability
In this paper, we design, implement and evaluate AdaptGuard, a software service for guarding adaptive systems, such as QoS-adaptive servers, from instability caused by software an...
Jin Heo, Tarek F. Abdelzaher