Sciweavers

1268 search results - page 208 / 254
» Verifying distributed systems: the operational approach
Sort
View
SOQUA
2007
13 years 11 months ago
Designing multi-layers self-adaptive complex applications
The impossibility of statically determining the behavior of complex systems that interact at runtime with heterogeneous devices and remote entities, may lead to unexpected system ...
Davide Lorenzoli, Davide Tosi, Salvatore Venticinq...
CLUSTER
2000
IEEE
14 years 2 months ago
Partition Repositories for Partition Cloning - OS Independent Software Maintenance in Large Clusters of PCs
As a novel approach to software maintenance in large clusters of PCs requiring multiple OS installations we implemented partition cloning and partition repositories as well as a s...
Felix Rauch, Christian Kurmann, Thomas Stricker
ICDCSW
2005
IEEE
14 years 3 months ago
Probability Based Power Aware Error Resilient Coding
Error resilient encoding in video communication is becoming increasingly important due to data transmission over unreliable channels. In this paper, we propose a new power-aware e...
Minyoung Kim, Hyunok Oh, Nikil D. Dutt, Alexandru ...
USS
2008
14 years 7 days ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
EUROSYS
2010
ACM
14 years 3 months ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...