Sciweavers

4744 search results - page 917 / 949
» Connected Computing
Sort
View
RAID
2004
Springer
14 years 1 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
HICSS
2003
IEEE
143views Biometrics» more  HICSS 2003»
14 years 1 months ago
Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called scatternet. However, the structure of scatternets...
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang, Chun-...
P2P
2003
IEEE
110views Communications» more  P2P 2003»
14 years 1 months ago
The Effectiveness of Realistic Replication Strategies on Quality of Availability for Peer-to-Peer Systems
In this paper, we take an availability-centric view on quality of service (QoS) and propose a model and mechanisms for studying the effectiveness of realistic replication schemes ...
Giwon On, Jens Schmitt, Ralf Steinmetz
WMCSA
2003
IEEE
14 years 1 months ago
A Historic Name-Trail Service
1 In this work we consider the mobility of personal online identifiers. People change the identifiers through which they are reachable on-line as they change jobs or residences ...
Petros Maniatis, Mary Baker
WORDS
2003
IEEE
14 years 1 months ago
ORB Middleware Evolution for Networked Embedded Systems
Standards-based COTS middleware has been shown to be effective in meeting a range of functional and QoS requirements for distributed real-time and embedded (DRE) systems. Each sta...
Christopher D. Gill, Venkita Subramonian, Jeff Par...