Sciweavers

2009 search results - page 369 / 402
» Towards Self-Configuring Networks
Sort
View
SIGMETRICS
2008
ACM
144views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Co-designing the failure analysis and monitoring of large-scale systems
Large-scale distributed systems provide the backbone for numerous distributed applications and online services. These systems span over a multitude of computing nodes located at d...
Abhishek Chandra, Rohini Prinja, Sourabh Jain, Zhi...
TDSC
2008
125views more  TDSC 2008»
13 years 9 months ago
Trustworthy Computing under Resource Constraints with the DOWN Policy
Trustworthy computing modules like secure coprocessors (ScP) are already in extensive use today, albeit limited predominantly to scenarios where constraints on cost is not a seriou...
Mahalingam Ramkumar
JFR
2007
131views more  JFR 2007»
13 years 9 months ago
Adaptive teams of autonomous aerial and ground robots for situational awareness
In this paper, we report on the integration challenges of the various component technologies developed towards the establishment of a framework for deploying an adaptive system of...
M. Ani Hsieh, Anthony Cowley, James F. Keller, Lui...
JGAA
2007
124views more  JGAA 2007»
13 years 9 months ago
Energy Models for Graph Clustering
The cluster structure of many real-world graphs is of great interest, as the clusters may correspond e.g. to communities in social networks or to cohesive modules in software syst...
Andreas Noack
TON
2008
86views more  TON 2008»
13 years 9 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...