STERN 发表于 2025-3-25 06:17:46

Gossiping: Adaptive and Reliable Broadcasting in MANETs delivery of messages. The spreading of broadcast messages has a strong similarity with the spreading of infectious diseases. Applying epidemiological models to broadcasting allows an easy evaluation of such strategies depending on the MANET characteristics, e.g. the node density. In this paper, we

炸坏 发表于 2025-3-25 09:02:23

On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenariostly affected by terrain, obstacles, battery exhaustion and node mobility. Existing broadcasting protocols for MANETs are able to deal with mobility, as well as congestion and collision, but only when under a fail-stop failure model. However, this model is not a good representative of the real scenar

发炎 发表于 2025-3-25 12:01:43

Failure Boundedness in Discrete Applicationslous state. This is in contrast with continuous feedback systems where wrong outputs can only gradually deviate the system under control from its intended set point. Transient errors may even be filtered by the latency inherent to the physical application. In this paper we extend our previous experi

Femish 发表于 2025-3-25 16:04:19

http://reply.papertrans.cn/27/2658/265706/265706_24.png

新星 发表于 2025-3-25 23:34:51

Component-Based Software Certification Based on Experimental Risk Assessments such as ISO/IEC 9126, ISO/IEC 14598 or ISO/IEC 25051. In many application areas, especially in mission-critical applications, certification is essential or even mandatory. However, the certification of software products using common off-the-shelf (COTS) components is difficult to attain, as detail

resilience 发表于 2025-3-26 00:09:54

Integrated Intrusion Detection in Databasessms to protect data. However these mechanisms cannot always stop malicious users from accessing the data by exploiting system vulnerabilities. In fact, when a malicious user accesses the database there is no effective way to detect and stop the attack in due time. This practical experience report pr

闯入 发表于 2025-3-26 06:16:55

http://reply.papertrans.cn/27/2658/265706/265706_27.png

MOAT 发表于 2025-3-26 11:57:54

Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments?y evaluation experiments. The tutorial, intended for researchers working in experimental dependability evaluation, includes a demonstration of the use of these technologies in a concrete example of experimental dependability evaluation.

生来 发表于 2025-3-26 16:37:25

http://reply.papertrans.cn/27/2658/265706/265706_29.png

laceration 发表于 2025-3-26 20:17:08

BAR—Where Distributed Computing Meets Game Theoryive because their diffused control structure may yield services that are potentially less costly and more democratic than their more centralized counterparts. Unfortunately, they are also particularly problematic from a dependability standpoint as they challenge the traditional distinction between c
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Dependable Computing; Third Latin-American Andrea Bondavalli,Francisco Brasileiro,Sergio Rajs Conference proceedings 2007 Springer-Verlag B