Sciweavers

1189 search results - page 203 / 238
» Minimizing churn in distributed systems
Sort
View
EUC
2005
Springer
14 years 2 months ago
An Integrated Scheme for Address Assignment and Service Location in Pervasive Environments
We propose an efficient scheme called CoReS (Configuration and Registration Scheme) that integrates address assignment and service location for ad hoc networks prevalent in pervasi...
Mijeom Kim, Mohan Kumar, Behrooz Shirazi
MSWIM
2004
ACM
14 years 2 months ago
Modeling wireless shadow networks
In case of natural disasters or intentional attacks, telecommunication networks often get heavily damaged and current resilience schemes have proven to be insufficient for rapid r...
Filip De Turck, Aurel A. Lazar
SRDS
2003
IEEE
14 years 2 months ago
Performance and Effectiveness Analysis of Checkpointing in Mobile Environments
Many mathematical models have been proposed to evaluate the execution performance of an application with and without checkpointing in the presence of failures. They assume that th...
Xinyu Chen, Michael R. Lyu
ATAL
2008
Springer
13 years 10 months ago
Learning task-specific trust decisions
We study the problem of agents locating other agents that are both capable and willing to help complete assigned tasks. An agent incurs a fixed cost for each help request it sends...
Ikpeme Erete, Erin Ferguson, Sandip Sen
CCR
2010
152views more  CCR 2010»
13 years 6 months ago
CYBEX: the cybersecurity information exchange framework (x.1500)
The cybersecurity information exchange framework, known as CYBEX, is currently undergoing its first iteration of standardization efforts within ITU-T. The framework describes how ...
Anthony M. Rutkowski, Youki Kadobayashi, Inette Fu...