Sciweavers

779 search results - page 112 / 156
» Modeling Dependable Systems using Hybrid Bayesian Networks
Sort
View
JSAC
2007
87views more  JSAC 2007»
13 years 7 months ago
Hidden-Action in Network Routing
— In communication networks, such as the Internet or mobile ad-hoc networks, the actions taken by intermediate nodes or links are typically hidden from the communicating endpoint...
Michal Feldman, John Chuang, Ion Stoica, Scott She...
OSN
2011
13 years 2 months ago
A distributed impairment aware QoS framework for all-optical networks
—Different physical impairments can occur in optical transmission systems. Impairments such as fiber nonlinear effects are dependent on network state and vary with traffic and to...
Wenhao Lin, Timothy Hahn, Richard S. Wolff, Brenda...
DSN
2004
IEEE
13 years 11 months ago
Fault Tolerance Tradeoffs in Moving from Decentralized to Centralized Embedded Systems
Some safety-critical distributed embedded systems may need to use centralized components to achieve certain dependability properties. The difficulty in combining centralized and d...
Jennifer Morris, Daniel Kroening, Philip Koopman
ANTSW
2008
Springer
13 years 9 months ago
Modeling Phase Transition in Self-organized Mobile Robot Flocks
We implement a self-organized flocking behavior in a group of mobile robots and analyze its transition from an aligned state to an unaligned state. We briefly describe the robot an...
Ali Emre Turgut, Cristián Huepe, Hande &Cce...
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 8 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...