Sciweavers

2310 search results - page 284 / 462
» Managing System and Active-Content Integrity
Sort
View
126
Voted
CHARME
2003
Springer
129views Hardware» more  CHARME 2003»
15 years 9 months ago
On the Correctness of an Intrusion-Tolerant Group Communication Protocol
Intrusion-tolerance is the technique of using fault-tolerance to achieve security properties. Assuming that faults, both benign and Byzantine, are unavoidable, the main goal of Int...
Mohamed Layouni, Jozef Hooman, Sofiène Taha...
121
Voted
IEAAIE
2003
Springer
15 years 9 months ago
UMAS Learning Requirement for Controlling Network Resources
- This paper presents an intelligent User Manager Agent System (UMAS) in which it has a capability of making a management decision for balancing the network load with the users’ ...
Abdullah Gani, Nasser Abouzakhar, Gordon A. Manson
SSDBM
2010
IEEE
117views Database» more  SSDBM 2010»
15 years 9 months ago
LIVE: A Lineage-Supported Versioned DBMS
Abstract— This paper presents LIVE, a complete DBMS designed for applications with many stored derived relations, and with a need for simple versioning capabilities when base dat...
Anish Das Sarma, Martin Theobald, Jennifer Widom
130
Voted
ISORC
2000
IEEE
15 years 8 months ago
Hierarchical Feedback Adaptation for Real Time Sensor-Based Distributed Applications
This paper presents an innovative hierarchical feedback adaptation method that efficiently controls the dynamic QoS behavior of real-time distributed data-flow applications, such ...
Mihaela Cardei, Ionut Cardei, Rakesh Jha, Allalagh...
144
Voted
CIKM
1994
Springer
15 years 8 months ago
Facilitating Transformations in a Human Genome Project Database
Human Genome Project databases present a confluence of interesting database challenges: rapid schema and data evolution, complex data entry and constraint management, and the need...
Susan B. Davidson, Anthony Kosky, Barbara A. Eckma...