Sciweavers

2400 search results - page 355 / 480
» Systems Failures
Sort
View
ICDCS
2003
IEEE
14 years 3 months ago
Responsive Security for Stored Data
We present the design of a distributed store that offers various levels of security guarantees while tolerating a limited number of nodes that are compromised by an adversary. The...
Subramanian Lakshmanan, Mustaque Ahamad, H. Venkat...
HPDC
2002
IEEE
14 years 3 months ago
A Decentralized, Adaptive Replica Location Mechanism
We describe a decentralized, adaptive mechanism for replica location in wide-area distributed systems. Unlike traditional, hierarchical (e.g, DNS) and more recent (e.g., CAN, Chor...
Matei Ripeanu, Ian T. Foster
GLOBECOM
2008
IEEE
14 years 4 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
CONTEXT
2007
Springer
14 years 4 months ago
Coping with Unconsidered Context of Formalized Knowledge
The paper focuses on a difficult problem when formalizing knowledge: What about the possible concepts that didn’t make it into the formalization? We call such concepts the uncons...
Stefan Mandl, Bernd Ludwig
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
14 years 3 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif