找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Dependable Computing; Third Latin-American Andrea Bondavalli,Francisco Brasileiro,Sergio Rajs Conference proceedings 2007 Springer-Verlag B

[复制链接]
楼主: 水平
发表于 2025-3-25 06:17:46 | 显示全部楼层
Gossiping: Adaptive and Reliable Broadcasting in MANETs delivery of messages. The spreading of broadcast messages has a strong similarity with the spreading of infectious diseases. Applying epidemiological models to broadcasting allows an easy evaluation of such strategies depending on the MANET characteristics, e.g. the node density. In this paper, we
发表于 2025-3-25 09:02:23 | 显示全部楼层
On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenariostly affected by terrain, obstacles, battery exhaustion and node mobility. Existing broadcasting protocols for MANETs are able to deal with mobility, as well as congestion and collision, but only when under a fail-stop failure model. However, this model is not a good representative of the real scenar
发表于 2025-3-25 12:01:43 | 显示全部楼层
Failure Boundedness in Discrete Applicationslous state. This is in contrast with continuous feedback systems where wrong outputs can only gradually deviate the system under control from its intended set point. Transient errors may even be filtered by the latency inherent to the physical application. In this paper we extend our previous experi
发表于 2025-3-25 16:04:19 | 显示全部楼层
发表于 2025-3-25 23:34:51 | 显示全部楼层
Component-Based Software Certification Based on Experimental Risk Assessments such as ISO/IEC 9126, ISO/IEC 14598 or ISO/IEC 25051. In many application areas, especially in mission-critical applications, certification is essential or even mandatory. However, the certification of software products using common off-the-shelf (COTS) components is difficult to attain, as detail
发表于 2025-3-26 00:09:54 | 显示全部楼层
Integrated Intrusion Detection in Databasessms to protect data. However these mechanisms cannot always stop malicious users from accessing the data by exploiting system vulnerabilities. In fact, when a malicious user accesses the database there is no effective way to detect and stop the attack in due time. This practical experience report pr
发表于 2025-3-26 06:16:55 | 显示全部楼层
发表于 2025-3-26 11:57:54 | 显示全部楼层
Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments?y evaluation experiments. The tutorial, intended for researchers working in experimental dependability evaluation, includes a demonstration of the use of these technologies in a concrete example of experimental dependability evaluation.
发表于 2025-3-26 16:37:25 | 显示全部楼层
发表于 2025-3-26 20:17:08 | 显示全部楼层
BAR—Where Distributed Computing Meets Game Theoryive because their diffused control structure may yield services that are potentially less costly and more democratic than their more centralized counterparts. Unfortunately, they are also particularly problematic from a dependability standpoint as they challenge the traditional distinction between c
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 03:17
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表