Sciweavers

295 search results - page 34 / 59
» Severity Levels of Inconsistent Code
Sort
View
IPPS
2006
IEEE
14 years 3 months ago
Fault injection in distributed Java applications
In a network consisting of several thousands computers, the occurrence of faults is unavoidable. Being able to test the behaviour of a distributed program in an environment where ...
William Hoarau, Sébastien Tixeuil, Fabien V...
CCL
1994
Springer
14 years 1 months ago
Application of Constraint Logic Programming for VLSI CAD Tools
Abstract: This paper describes the application of CLP (constraint logic programming) to several digital circuit design problems. It is shown that logic programming together with ef...
Renate Beckmann, Ulrich Bieker, Ingolf Markhof
APPINF
2003
13 years 11 months ago
A Comparison of Two Different Java Technologies to Implement a Mobile Agent System
This paper describes an evaluation of the two technologies Aglets from IBM Japan and JavaSpaces from Sun Microsystems used to implement the same mobile agent system. The Aglets fr...
Alf Inge Wang, Carl-Fredrik Sørensen
FTCS
1993
87views more  FTCS 1993»
13 years 11 months ago
Disk Array Storage System Reliability
Fault tolerance requirements for near term disk array storage systems are analyzed. The excellent reliability provided by RAID Level 5 data organization is seen to be insu cient f...
Walter A. Burkhard, Jai Menon
TIFS
2008
152views more  TIFS 2008»
13 years 9 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...