Sciweavers

DSN
2008
IEEE
14 years 6 months ago
Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQL
Multi-Instance-Precommit (MIP) has been recently presented as an innovative transaction management scheme in support of reliability for Atomic Transactions in multitier (e.g. Web-...
Paolo Romano, Francesco Quaglia
DSN
2008
IEEE
14 years 6 months ago
Toward an understanding of the processing delay of peer-to-peer relay nodes
Abstract—Peer-to-peer relaying is commonly used in realtime applications to cope with NAT and firewall restrictions and provide better quality network paths. As relaying is not ...
Kuan-Ta Chen, Jing-Kai Lou
DSN
2008
IEEE
14 years 6 months ago
SymPLFIED: Symbolic program-level fault injection and error detection framework
This paper introduces SymPLFIED, a program-level framework which allows specification of arbitrary error detectors and the verification of their efficacy against hardware errors. ...
Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalba...
AINA
2008
IEEE
14 years 6 months ago
Intra Domain Route Optimization for Ubiquitous
The main advantage of a wireless network is user mobility, which calls for efficient routing support at the network layer. An architecture combines hierarchical mobile IPv6 and ne...
Hye-Young Kim, Young-Sik Jeong, Laurence Tianruo Y...
AINA
2008
IEEE
14 years 6 months ago
A Workflow-Based Access Control Framework for e-Health Applications
Giovanni Russello, Changyu Dong, Naranker Dulay
AINA
2008
IEEE
14 years 6 months ago
Annulling SYN Flooding Attacks with Whitelist
SYN flooding is one of classical Denial of Service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a server not to accept additional connection requests...
Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je H...
AINA
2008
IEEE
14 years 6 months ago
Geographical Routing in Intermittently Connected Ad Hoc Networks
In intermittently connected ad hoc networks standard routing protocols like AODV, DSR and GPSR fail since they generally cannot find a contemporaneous path from source to destinat...
Erik Kuiper, Simin Nadjm-Tehrani
AINA
2008
IEEE
14 years 6 months ago
Opportunistic Data Dissemination Using Real-World User Mobility Traces
— Opportunistic communication allows humans equipped with mobile devices to exchange information via a wireless link whenever they are nearby. This work examines the performance ...
Andreas Heinemann, Jussi Kangasharju, Max Müh...
AINA
2008
IEEE
14 years 6 months ago
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc n...
Jonah P. Tower, Thomas D. C. Little
AINA
2008
IEEE
14 years 6 months ago
Developing of an Ontological Focused-Crawler for Ubiquitous Services
This paper proposes the use of several ontological techniques to provide a semantic level solution for a search agent so that it can provide fast, precise, and stable search resul...
Sheng-Yuan Yang