Sciweavers

623 search results - page 56 / 125
» Declarative Network Verification
Sort
View
NETWORKING
2010
13 years 10 months ago
Efficient Recovery from False State in Distributed Routing Algorithms
Abstract--Malicious and misconfigured nodes can inject incorrect state into a distributed system, which can then be propagated system-wide as a result of normal network operation. ...
Daniel Gyllstrom, Sudarshan Vasudevan, Jim Kurose,...
HIPC
2007
Springer
14 years 20 days ago
Accomplishing Approximate FCFS Fairness Without Queues
First Come First Served (FCFS) is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems, scheduling web req...
K. Subramani, Kamesh Madduri
IJNSEC
2006
89views more  IJNSEC 2006»
13 years 8 months ago
Mitigation of Insider Risks using Distributed Agent Detection, Filtering, and Signaling
An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more...
Adam J. Rocke, Ronald F. DeMara
ICDCSW
2006
IEEE
14 years 2 months ago
Contory: A Smart Phone Middleware Supporting Multiple Context Provisioning Strategies
This paper presents Contory, a middleware specifically deployed to support provisioning of context information on mobile devices such as smart phones. Contory integrates multiple...
Oriana Riva, Cristiano di Flora
IIE
2007
91views more  IIE 2007»
13 years 8 months ago
New Media and Open and Distance Learning: New challenges for Education in a Knowledge Society
The “digital society” provides not only with new technology, but also with new concepts. Information plays a central role and becomes a valuable good, but knowledge cannot be r...
Bernard Cornu