Sciweavers

870 search results - page 136 / 174
» The failure detector abstraction
Sort
View
IWSEC
2009
Springer
14 years 3 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
MIDDLEWARE
2009
Springer
14 years 3 months ago
Rhizoma: A Runtime for Self-deploying, Self-managing Overlays
Abstract. The trend towards cloud and utility computing infrastructures raises challenges not only for application development, but also for management: diverse resources, changing...
Qin Yin, Adrian Schüpbach, Justin Cappos, And...
GLOBECOM
2008
IEEE
14 years 3 months ago
Performance Metric Sensitivity Computation for Optimization and Trade-Off Analysis in Wireless Networks
Abstract—We develop and evaluate a new method for estimating and optimizing various performance metrics for multihop wireless networks, including MANETs. We introduce an approxim...
John S. Baras, Vahid Tabatabaee, George Papageorgi...
WCNC
2008
IEEE
14 years 3 months ago
Characterizing Link Importance in Multi-Channel, Multi-Radio, Multi-Rate Wireless Mesh Networks
Abstract— Modern day wireless networks are increasingly supporting various civilian applications that require high bandwidth for successful operation. In such cases, it is import...
Ranjan Pal, Chen-Nee Chuah
GLOBECOM
2007
IEEE
14 years 3 months ago
A MAC Protocol with Directional Antennas for Deafness Avoidance in Ad Hoc Networks
Abstract—Directional antennas are expected to provide significant improvements over omni-directional antennas in wireless ad hoc networks. Directional MAC protocols, however, int...
Masanori Takata, Masaki Bandai, Takashi Watanabe