Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
This paper presents a mechanism for dynamic reconfiguration of component-based applications and its fault tolerance strategy. The mechanism, named generic connector, allows compos...
—In this paper, we propose a distributed load balancing using association control, especially for Tactical Information Communication Networks (TICNs). We develop a scheme for eff...
This paper addresses the evaluation of a fault-tolerant model for tactic operations of mobile robotic groups. The coordinated action of the group is planned with Genetic Algorithm...
High-end enterprise storage has traditionally consisted of monolithic systems with customized hardware, multiple redundant components and paths, and no single point of failure. Di...