Sciweavers

1720 search results - page 129 / 344
» Unranking Combinations in Parallel
Sort
View
DCOSS
2006
Springer
15 years 7 months ago
Locating Compromised Sensor Nodes Through Incremental Hashing Authentication
Abstract. While sensor networks have recently emerged as a promising computing model, they are vulnerable to various node compromising attacks. In this paper, we propose COOL, a CO...
Youtao Zhang, Jun Yang 0002, Lingling Jin, Weijia ...
EDO
2006
Springer
15 years 7 months ago
Service communities: applications and middleware
Businesses increasingly provide and use services, applying formal (Web) services technology for the description, composition, and management of software as services. At the same t...
Stefan Tai, Nirmit Desai, Pietro Mazzoleni
EDO
2006
Springer
15 years 7 months ago
Ubiquitous RATs: how resource-aware run-time tests can improve ubiquitous software systems
In this paper we describe a new approach for increasing the reliability of ubiquitous software systems. This is achieved by executing tests at run-time. The individual software co...
Matthias Merdes, Rainer Malaka, Dima Suliman, Barb...
EUROPAR
2006
Springer
15 years 7 months ago
Storage Exchange: A Global Trading Platform for Storage Services
Abstract. The Storage Exchange (SX) is a new platform allowing storage to be treated as a tradeable resource. Organisations with varying storage requirements can use the SX platfor...
Martin Placek, Rajkumar Buyya
GCC
2006
Springer
15 years 7 months ago
Network Distance Prediction based on Network Coordinate System
Network coordinates provide a practical and efficient way to estimate latencies among hosts in the network. In this paper, we study the problem of designing and implementing a Net...
Xiaohui Shi, Yang Chen, Beixing Deng, Xing Li