Sciweavers

1583 search results - page 42 / 317
» The Quorum Deployment Problem
Sort
View
158
Voted
HPDC
2003
IEEE
15 years 8 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
158
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Strategizing surveillance for resource-constrained event monitoring
—Surveillance systems, such as sensor networks and surveillance camera networks, have been widely deployed to monitor events in many different scenarios. One common way to conser...
Xi Fang, Dejun Yang, Guoliang Xue
110
Voted
IPPS
2008
IEEE
15 years 9 months ago
NETEMBED: A network resource mapping service for distributed applications
Emerging configurable infrastructures (large-scale overlays, grids, distributed testbeds, and sensor networks among others) comprise diverse sets of computing resources and netwo...
Jorge Londoño, Azer Bestavros
96
Voted
INFOCOM
2009
IEEE
15 years 9 months ago
Full-Coverage and k-Connectivity (k=14, 6) Three Dimensional Networks
—In this paper, we study the problem of constructing full-coverage three dimensional networks with multiple connectivity. We design a set of patterns for full coverage and two re...
Xiaole Bai, Chuanlin Zhang, Dong Xuan, Weijia Jia
104
Voted
ACSAC
2005
IEEE
15 years 8 months ago
Uniform Application-level Access Control Enforcement of Organizationwide Policies
Fine-grained and expressive access control policies on application resources need to be enforced in applicationlevel code. Uniformly enforcing a single policy (referred to as the ...
Tine Verhanneman, Frank Piessens, Bart De Win, Wou...