The need for high availability and performance in data management systems has been fueling a long running interest in database replication from both academia and industry. However...
Emmanuel Cecchet, George Candea, Anastasia Ailamak...
The management of non-functional goals, or Service Level Agreements (SLA), in the development of business processes in a Service Oriented Architecture often requires much manual a...
Vinod Muthusamy, Hans-Arno Jacobsen, Phil Coulthar...
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
— This paper presents a bio-inspired, distributed control algorithm called TENTACLES for a group of radio robots to move, self-configure and maintain communication between some c...
Hi Cchi H. Chiu, Bo Ryu, Hua Zhu, Pedro A. Szekely...
The paper proposes an analytical approach to blocking probability calculation in the UMTS network carrying a mixture of multi-rate traffic, under the assumption that the part of re...
Maciej Stasiak, Piotr Zwierzykowski, Damian Parnie...