Sciweavers

2310 search results - page 284 / 462
» Managing System and Active-Content Integrity
Sort
View
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
14 years 1 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
IEAAIE
2003
Springer
14 years 1 months ago
UMAS Learning Requirement for Controlling Network Resources
- This paper presents an intelligent User Manager Agent System (UMAS) in which it has a capability of making a management decision for balancing the network load with the users’ ...
Abdullah Gani, Nasser Abouzakhar, Gordon A. Manson
SSDBM
2010
IEEE
117views Database» more  SSDBM 2010»
14 years 1 months ago
LIVE: A Lineage-Supported Versioned DBMS
Abstract— This paper presents LIVE, a complete DBMS designed for applications with many stored derived relations, and with a need for simple versioning capabilities when base dat...
Anish Das Sarma, Martin Theobald, Jennifer Widom
ISORC
2000
IEEE
14 years 14 days ago
Hierarchical Feedback Adaptation for Real Time Sensor-Based Distributed Applications
This paper presents an innovative hierarchical feedback adaptation method that efficiently controls the dynamic QoS behavior of real-time distributed data-flow applications, such ...
Mihaela Cardei, Ionut Cardei, Rakesh Jha, Allalagh...
CIKM
1994
Springer
14 years 6 days ago
Facilitating Transformations in a Human Genome Project Database
Human Genome Project databases present a confluence of interesting database challenges: rapid schema and data evolution, complex data entry and constraint management, and the need...
Susan B. Davidson, Anthony Kosky, Barbara A. Eckma...