Sciweavers

501 search results - page 68 / 101
» Redundancy and Diversity in Security
Sort
View
SIGUCCS
2003
ACM
14 years 1 months ago
Supporting a Windows XP/Red Hat Linux dual boot environment
Customers of public computing sites and faculty who use the public computer classrooms to teach want diversity in computing. Inevitably, there’s a group that does not want to te...
Bert Valenzuela
AGENTS
2000
Springer
14 years 8 days ago
Capability-based agent matchmaking
In an agent-based system, where different agents form dynamic associations for the purposes of collaborative processing, agents must be able to locate other agents that can provi...
Anthony R. Cassandra, Damith Chandrasekara, Marian...
AGENTS
2000
Springer
14 years 8 days ago
Hormone-based control for self-reconfigurable robots
Self-reconfigurable or metamorphic robots can change their individual and collective shape and size to meet operational demands. Since these robots are constructed from a set of a...
Wei-Min Shen, Yimin Lu, Peter M. Will
ICDCS
2010
IEEE
13 years 12 months ago
Sifting through Network Data to Cull Activity Patterns with HEAPs
—Today’s large campus and enterprise networks are characterized by their complexity, i.e. containing thousands of hosts, and diversity, i.e. with various applications and usage...
Esam Sharafuddin, Yu Jin, Nan Jiang, Zhi-Li Zhang
SIGCOMM
2010
ACM
13 years 8 months ago
DONAR: decentralized server selection for cloud services
Geo-replicated services need an effective way to direct client requests to a particular location, based on performance, load, and cost. This paper presents DONAR, a distributed sy...
Patrick Wendell, Joe Wenjie Jiang, Michael J. Free...