Sciweavers

2951 search results - page 24 / 591
» Secure Distributed DNS
Sort
View
TSE
2008
92views more  TSE 2008»
13 years 9 months ago
Evaluating Test Suites and Adequacy Criteria Using Simulation-Based Models of Distributed Systems
Test adequacy criteria provide the engineer with guidance on how to populate test suites. While adequacy criteria have long been a focus of research, existing testing methods do no...
Matthew J. Rutherford, Antonio Carzaniga, Alexande...
JCM
2007
68views more  JCM 2007»
13 years 9 months ago
Cost-effective Product Traceability System Based on Widely Distributed Databases
— A cost-effective and easy way of introducing a product traceability system is to start from a small system and gradually extend it to a large-scale system. Traceability systems...
Shirou Wakayama, Yusuke Doi, Satoshi Ozaki, Atsush...
ICC
2009
IEEE
179views Communications» more  ICC 2009»
14 years 4 months ago
Distributed Power Control for Interference-Limited Cooperative Relay Networks
— In this paper, a distributed power control algorithm is proposed for wireless relay networks in interference-limited environments. The objective is to minimize the total transm...
Sheng Zhou, Hongda Xiao, Zhisheng Niu
DEXAW
2006
IEEE
153views Database» more  DEXAW 2006»
14 years 3 months ago
Capturing and Using the Operational Semantics of Large Distributed Systems: Sharing Common Application Requirements in Virtual O
Organisations may wish to use a standards-defined distributed system in a global sense but also have a requirement for non-standard local behaviour. This reflects the production...
Nickolas J. G. Falkner, Paul D. Coddington, Andrew...
NSDI
2004
13 years 11 months ago
Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays
Structured peer-to-peer hash tables provide decentralization, self-organization, failure-resilience, and good worst-case lookup performance for applications, but suffer from high ...
Venugopalan Ramasubramanian, Emin Gün Sirer