找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Dependable Computing; Third Latin-American Andrea Bondavalli,Francisco Brasileiro,Sergio Rajs Conference proceedings 2007 Springer-Verlag B

[復(fù)制鏈接]
樓主: 水平
21#
發(fā)表于 2025-3-25 06:17:46 | 只看該作者
Gossiping: Adaptive and Reliable Broadcasting in MANETs delivery of messages. The spreading of broadcast messages has a strong similarity with the spreading of infectious diseases. Applying epidemiological models to broadcasting allows an easy evaluation of such strategies depending on the MANET characteristics, e.g. the node density. In this paper, we
22#
發(fā)表于 2025-3-25 09:02:23 | 只看該作者
On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenariostly affected by terrain, obstacles, battery exhaustion and node mobility. Existing broadcasting protocols for MANETs are able to deal with mobility, as well as congestion and collision, but only when under a fail-stop failure model. However, this model is not a good representative of the real scenar
23#
發(fā)表于 2025-3-25 12:01:43 | 只看該作者
Failure Boundedness in Discrete Applicationslous state. This is in contrast with continuous feedback systems where wrong outputs can only gradually deviate the system under control from its intended set point. Transient errors may even be filtered by the latency inherent to the physical application. In this paper we extend our previous experi
24#
發(fā)表于 2025-3-25 16:04:19 | 只看該作者
25#
發(fā)表于 2025-3-25 23:34:51 | 只看該作者
Component-Based Software Certification Based on Experimental Risk Assessments such as ISO/IEC 9126, ISO/IEC 14598 or ISO/IEC 25051. In many application areas, especially in mission-critical applications, certification is essential or even mandatory. However, the certification of software products using common off-the-shelf (COTS) components is difficult to attain, as detail
26#
發(fā)表于 2025-3-26 00:09:54 | 只看該作者
Integrated Intrusion Detection in Databasessms to protect data. However these mechanisms cannot always stop malicious users from accessing the data by exploiting system vulnerabilities. In fact, when a malicious user accesses the database there is no effective way to detect and stop the attack in due time. This practical experience report pr
27#
發(fā)表于 2025-3-26 06:16:55 | 只看該作者
28#
發(fā)表于 2025-3-26 11:57:54 | 只看該作者
Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments?y evaluation experiments. The tutorial, intended for researchers working in experimental dependability evaluation, includes a demonstration of the use of these technologies in a concrete example of experimental dependability evaluation.
29#
發(fā)表于 2025-3-26 16:37:25 | 只看該作者
30#
發(fā)表于 2025-3-26 20:17:08 | 只看該作者
BAR—Where Distributed Computing Meets Game Theoryive because their diffused control structure may yield services that are potentially less costly and more democratic than their more centralized counterparts. Unfortunately, they are also particularly problematic from a dependability standpoint as they challenge the traditional distinction between c
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-22 17:59
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
武山县| 高密市| 永清县| 江华| 龙岩市| 禹州市| 慈利县| 桓台县| 卓尼县| 砀山县| 赞皇县| 驻马店市| 临夏县| 东方市| 怀来县| 郸城县| 龙门县| 阿克陶县| 兖州市| 徐闻县| 哈尔滨市| 措美县| 永宁县| 香河县| 土默特左旗| 红安县| 都安| 平度市| 珠海市| 纳雍县| 石阡县| 富顺县| 金阳县| 呼图壁县| 乌鲁木齐县| 沾化县| 陆丰市| 肥城市| 平遥县| 介休市| 兴海县|