Sciweavers

SSS
2009
Springer
14 years 6 months ago
Speculation for Parallelizing Runtime Checks
Martin Süßkraut, Stefan Weigert, Ute Sc...
SSS
2009
Springer
127views Control Systems» more  SSS 2009»
14 years 6 months ago
Robustness and Dependability of Self-Organizing Systems - A Safety Engineering Perspective
Abstract. This paper analyses the robustness of self-organizing (engineered) systems to perturbations (faults or environmental changes). It considers that a self-organizing system ...
Giovanna Di Marzo Serugendo
SSS
2009
Springer
103views Control Systems» more  SSS 2009»
14 years 6 months ago
Network-Friendly Gossiping
The emergence of large-scale distributed applications based on many-to-many communication models, e.g., broadcast and decentralized group communication, has an important impact on ...
Sabina Serbu, Etienne Riviere, Pascal Felber
SSS
2009
Springer
143views Control Systems» more  SSS 2009»
14 years 6 months ago
Self Adaptive High Interaction Honeypots Driven by Game Theory
High-interaction honeypots are relevant to provide rich and useful information obtained from attackers. Honeypots come in different flavors with respect to their interaction pote...
Gérard Wagener, Radu State, Alexandre Dulau...
SSS
2009
Springer
123views Control Systems» more  SSS 2009»
14 years 6 months ago
Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat
In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. I...
Márk Jelasity, Vilmos Bilicki
SSS
2009
Springer
163views Control Systems» more  SSS 2009»
14 years 6 months ago
Developing Autonomic and Secure Virtual Organisations with Chemical Programming
This paper studies the development of autonomic and secure Virtual Organisations (VOs) when following the chemical-programming paradigm. We have selected the Higher-Order Chemical ...
Alvaro E. Arenas, Jean-Pierre Banâtre, Thier...
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
14 years 6 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky
SSS
2009
Springer
209views Control Systems» more  SSS 2009»
14 years 6 months ago
CFlood: A Constrained Flooding Protocol for Real-time Data Delivery in Wireless Sensor Networks
Real-time performance is critical for many time-sensitive applications of wireless sensor networks. We present a constrained flooding protocol, called CFlood that enhances the dea...
Bo Jiang, Binoy Ravindran, Hyeonjoong Cho
SSS
2009
Springer
106views Control Systems» more  SSS 2009»
14 years 6 months ago
Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems
Emmanuelle Anceaume, Francisco Vilar Brasileiro, R...
SSS
2009
Springer
108views Control Systems» more  SSS 2009»
14 years 6 months ago
Local Algorithms: Self-stabilization on Speed
Christoph Lenzen, Jukka Suomela, Roger Wattenhofer