Sciweavers

1268 search results - page 169 / 254
» Verifying distributed systems: the operational approach
Sort
View
TPDS
2010
113views more  TPDS 2010»
13 years 4 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
EDOC
2006
IEEE
14 years 4 months ago
What Applying of the ODP Viewpoints Teaches Us about Tool-Chains
For some time, we have focused our research on the generic B2B middleware services for managing interenterprise communities of autonomous business services. In contrast to some ea...
Lea Kutvonen
EDOC
2006
IEEE
14 years 4 months ago
Scheduling Real-Time Components Using Jitter-Constrained Streams
Abstract— Component-based applications require good middleware support. In particular, business logic should be separated from management code for guaranteeing nonfunctional prop...
Claude-Joachim Hamann, Steffen Zschaler
WD
2010
13 years 4 months ago
Mobility-aware peer-to-peer live-streaming
Application Layer Multicast (ALM) has become a popular form of content distribution. It shows some favourable properties like inherent scalability and the overcoming of the traditi...
Markus Trapp, Mathias Fischer, Guenter Schaefer
POPL
2006
ACM
14 years 10 months ago
Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations
The TCP/IP protocols and Sockets API underlie much of modern computation, but their semantics have historically been very complex and ill-defined. The real standard is the de fact...
Steve Bishop, Matthew Fairbairn, Michael Norrish, ...