Sciweavers

347 search results - page 27 / 70
» Proactive Computing
Sort
View
IPPS
2000
IEEE
14 years 2 months ago
Network Survivability Simulation of a Commercially Deployed Dynamic Routing System Protocol
With the ever-increasing demands on server applications, many new server services are distributed in nature. We evaluated one hundred deployed systems and found that over a one-yea...
Abdur Chowdhury, Ophir Frieder, Paul Luse, Peng-Ju...
CLUSTER
2007
IEEE
14 years 4 months ago
Evaluation of fault-tolerant policies using simulation
— Various mechanisms for fault-tolerance (FT) are used today in order to reduce the impact of failures on application execution. In the case of system failure, standard FT mechan...
Anand Tikotekar, Geoffroy Vallée, Thomas Na...
AAAI
2008
14 years 6 days ago
Reinforcement Learning for Vulnerability Assessment in Peer-to-Peer Networks
Proactive assessment of computer-network vulnerability to unknown future attacks is an important but unsolved computer security problem where AI techniques have significant impact...
Scott Dejmal, Alan Fern, Thinh Nguyen
WCNC
2008
IEEE
14 years 4 months ago
RTRD: Real-Time and Reliable Data Delivery in Ad Hoc Networks
—In this paper, we present a reliable real-time data delivery (communication) mechanism for ad-hoc networks, called RTRD. The mechanism makes use of a proactive wireless routing ...
Kai Han, Guanhong Pei, Binoy Ravindran, Hyeonjoong...
CHI
2009
ACM
14 years 10 months ago
Interacting with eHealth: towards grand challenges for HCI
While health records are increasingly stored electronically, we, as citizens, have little access to this data about ourselves. We are not used to thinking of these official record...
m. c. schraefel, Paul André, Ryen White, De...