: This paper gives the main definitions relating to dependability, a generic concept including as special case such attributes as reliability, availability, safety, confidentiality...
Algirdas Avizienis, Jean-Claude Laprie, Brian Rand...
: Constructing a certification path is the mainly method of validating a certificate at given time. The established path will consist of all the valid certificates that reside betw...
This paper presents a new algorithm, Extra, for extending the lifetime of ad hoc networks. Extra tries to conserve energy by identifying and switching off nodes that are momentaril...
R. I. da Silva, Julius C. B. Leite, M. P. Fernande...
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Dynamic pricing schemes in telecommunication networks were traditionally employed to create users’ incentives in such a way that the overall utilization is improved and profits a...
This work proposes a XML-based framework for distributing and enforcing RSVP access control policies, for RSVP-aware application servers. Policies are represented by extending XAC...
Abstract. Resource limitation on management scripts has been an important requirement for distributed management environments. This article proposes a Script MIB extension with new...