派博傳思國際中心

標(biāo)題: Titlebook: Dependable Computing; 14th European Worksh Marco Vieira,Jo?o Carlos Cunha Conference proceedings 2013 Springer-Verlag Berlin Heidelberg 201 [打印本頁]

作者: Jefferson    時間: 2025-3-21 16:12
書目名稱Dependable Computing影響因子(影響力)




書目名稱Dependable Computing影響因子(影響力)學(xué)科排名




書目名稱Dependable Computing網(wǎng)絡(luò)公開度




書目名稱Dependable Computing網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Dependable Computing被引頻次




書目名稱Dependable Computing被引頻次學(xué)科排名




書目名稱Dependable Computing年度引用




書目名稱Dependable Computing年度引用學(xué)科排名




書目名稱Dependable Computing讀者反饋




書目名稱Dependable Computing讀者反饋學(xué)科排名





作者: alleviate    時間: 2025-3-21 23:07
A Dependable Alternative to the Spanning Tree Protocolescribes the main characteristics, processes and mechanisms of SCS, presents some lab and simulation experiments with STP and SCS, and provides demonstrations that SCS provides a more reliable service than STP variants, and a more cost effective alternative to TRILL and SPB network dependability.
作者: 傲慢人    時間: 2025-3-22 00:26

作者: Inculcate    時間: 2025-3-22 06:37
Perturbation Methods: Framework and Toolsescribes the main characteristics, processes and mechanisms of SCS, presents some lab and simulation experiments with STP and SCS, and provides demonstrations that SCS provides a more reliable service than STP variants, and a more cost effective alternative to TRILL and SPB network dependability.
作者: 盡忠    時間: 2025-3-22 09:19
Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Treesthe sensor network is protected from cyber-security threats. In this paper we present a new IDS architecture designed to ensure a trade-off between different requirements: high detection rate is obtained through decision tree classification; energy saving is obtained through light detection techniqu
作者: intricacy    時間: 2025-3-22 16:03

作者: intricacy    時間: 2025-3-22 17:53

作者: 詢問    時間: 2025-3-23 01:06
Model-Driven Evaluation of User-Perceived Service Availability system design. However, it remains difficult to evaluate dependability of such distributed and heterogeneous functionality as it depends highly on the properties of the enabling information and communications technology (ICT) infrastructure. Moreover, every specific pair service client and provider
作者: Calculus    時間: 2025-3-23 01:41

作者: Colonnade    時間: 2025-3-23 06:46

作者: 飲料    時間: 2025-3-23 11:11

作者: 音樂學(xué)者    時間: 2025-3-23 17:52

作者: 類型    時間: 2025-3-23 18:10

作者: 幾何學(xué)家    時間: 2025-3-24 01:14

作者: 提煉    時間: 2025-3-24 04:48

作者: Audiometry    時間: 2025-3-24 06:35

作者: 決定性    時間: 2025-3-24 10:49
A Dependable Alternative to the Spanning Tree Protocole replacement of STP variants, most of them proprietary and with limited scope of operation. The recent protocols, IETF TRILL and IEEE SPB, target mainly data center networks, are based on complex concepts, require great processing power from switches and huge investment in new gear..In this paper w
作者: accrete    時間: 2025-3-24 17:18
Understanding (Mis)Information Spreading for Improving Corporate Network Trustworthinesss employees at the lower levels in the organization chart may become influential thanks to social connections. This unexpected influence could be dangerous if the employee behaves maliciously reducing thus the trustworthiness of the overall organization. The paper is a first attempt in understanding
作者: 生命    時間: 2025-3-24 22:44
Software Component Replication for Improved Fault-Tolerance: Can Multicore Processors Make It Work?at may lead to the application failure. In this work we revisit the idea of software component replication for masking software bugs in the context of multi-core systems. We propose a new abstraction: a .. A . is a software component that includes several internal replicas with diverse implementatio
作者: Ceremony    時間: 2025-3-25 02:55

作者: Expostulate    時間: 2025-3-25 06:05

作者: Decongestant    時間: 2025-3-25 08:39
Towards Dependable Measurements in Coastal Sensors Networkshe system is to achieve reliable flood protection and response. This is challenging because of the inherent presence of a cascade of uncertainties in the forecast models, and also uncertainties affecting the timeliness and quality of raw sensor data that is used in the forecasting processes. Achievi
作者: ACTIN    時間: 2025-3-25 13:26

作者: 態(tài)度暖昧    時間: 2025-3-25 17:07
Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Treeses on the motes. A dataset including sinkhole attack has been created and employed to evaluate the effectiveness of the proposed solution. Such a dataset has been made available, and will facilitate future comparisons of alternative solutions.
作者: cloture    時間: 2025-3-25 22:47

作者: Legion    時間: 2025-3-26 02:57

作者: 一罵死割除    時間: 2025-3-26 07:14

作者: travail    時間: 2025-3-26 12:12
Open Challenges in the Resilience Evaluation of Ad Hoc Networksc networks. This paper focuses on identifying these challenges to provide potential evaluators with a guide of the sensitive points that require an especial attention to improve the credibility of results when addressing the resilience evaluation of ad hoc networks.
作者: 秘方藥    時間: 2025-3-26 14:33

作者: 猛擊    時間: 2025-3-26 19:36
Conference proceedings 2013l, in May 2013. The 9 full papers and 6 short papers presented were carefully reviewed and selected from 24 submissions. Also included in the volume are 6 fast abstracts presenting work in progress or new ideas in the dependability area. The papers are organized in topical sections on wireless senso
作者: Contend    時間: 2025-3-26 21:44

作者: Nefarious    時間: 2025-3-27 02:49

作者: 易于出錯    時間: 2025-3-27 07:22
https://doi.org/10.1007/978-3-642-51512-5the network by means of Software Defined Networking approach. The paper presents the architecture we have in mind and that will be deployed and validated against a real world distributed Air Traffic Control system, for which missing dependability and security targets would result in huge business and human losses.
作者: 即席演說    時間: 2025-3-27 10:15

作者: 爭議的蘋果    時間: 2025-3-27 17:31

作者: 鍍金    時間: 2025-3-27 18:39
Formal Analysis of Dynamic Domain Establishment Protocol in Cloud Logging Servicenformation leakage problem, to solve this problem we propose a modification of the protocol by adding a key update protocol. After these modifications, this protocol has been verified with AVISPA to be safe from these two attacks.
作者: 深陷    時間: 2025-3-28 01:12

作者: Hangar    時間: 2025-3-28 03:06

作者: VICT    時間: 2025-3-28 07:40
Intercept: Profiling Windows Network Device Driversreverse engineering. Experiments using Ethernet, Wi-Fi and Bluetooth device drivers show that Intercept is able to record function calls, parameters and return values, with small overheads even when the device driver under test is subject to a heavy workload.
作者: 炸壞    時間: 2025-3-28 11:35
Towards Dependable Measurements in Coastal Sensors Networksd marine environments, we overview the main challenges that need to be addressed and we introduce some initial ideas on what needs to be done in order to deal with external disturbances causing faulty measurements.
作者: integrated    時間: 2025-3-28 16:33

作者: eulogize    時間: 2025-3-28 19:13

作者: 形容詞詞尾    時間: 2025-3-29 02:52
Solid Mechanics and Its Applications and it is a single point of failure. In this context we examined Network Time Protocol (NTP) as an alternative time source when the GPS receiver is compromised. In this paper a resilient architecture is proposed that is able to detect and react to the GPS spoofing attack. Experimental tests have shown the effectiveness of our solution.
作者: Ruptured-Disk    時間: 2025-3-29 05:13
Nonlinear Equations and Optimizationurrently, thus incurring in minimal overhead. Also, by exploring the multiple existent implementations of well-known interfaces, it is possible to use the idea without incurring in additional development cost.
作者: 靦腆    時間: 2025-3-29 09:23
The Challenge of Detection and Diagnosis of Fugacious Hardware Faults in VLSI Designses like radiation, suffering from wear-out, or being affected by an intermittent fault. Upon detection, systems may react to adapt the deployed fault tolerance mechanisms to the diagnosed problem. This paper explores these ideas evaluating challenges and requirements involved, and provides an outline of potential techniques to be applied.
作者: indicate    時間: 2025-3-29 14:30

作者: Ligneous    時間: 2025-3-29 18:22

作者: Dna262    時間: 2025-3-29 23:42

作者: Osmosis    時間: 2025-3-30 01:45
Middleware Support for Adaptive Real-Time Applications in Wireless Sensor Networks of this framework, explaining why they are needed and what they provide. In order to illustrate how this middleware can be used and its potential benefits, we consider the well-known LQER routing protocol to show how it must be changed to incorporate probabilistic real-time requirements and meet them in a dependable way.
作者: thalamus    時間: 2025-3-30 06:40
Issues and Ongoing Work on State-Driven Workload Generation for Distributed Systemss is nontrivial due to system complexity and non-deterministic factors. This work discusses our ongoing work on a state-driven workload generation approach for distributed systems, based on an evolutionary algorithm, and its preliminary implementation for testing a fault-tolerant distributed system for flight data processing.
作者: 發(fā)炎    時間: 2025-3-30 11:58
GRIMACE: GeneRIc MetAmodel for Domain Component modElling into account the specificities of each domain. The resulting modeling framework serves primarily to capture the basic concepts of concerns related to component systems development based on the clear separation between the development process, interactions and the domain knowledge.
作者: SLUMP    時間: 2025-3-30 13:29
Conference proceedings 2013re 6 fast abstracts presenting work in progress or new ideas in the dependability area. The papers are organized in topical sections on wireless sensor networks; cloud computing and services; testing and fault detection, fault injection and benchmarking and dependable and secure computing.
作者: 外向者    時間: 2025-3-30 17:49

作者: Shuttle    時間: 2025-3-31 00:16

作者: miracle    時間: 2025-3-31 02:36
Perturbation Methods: Solutions this phenomenon by proposing a model for corporate networks that is able to measure the influence of each employee on the overall organizational chart, that is, to which extent an employee is able to spread (mis)information through the corporate network. The evaluation is done considering the Enron case.
作者: Prologue    時間: 2025-3-31 06:37

作者: BLANC    時間: 2025-3-31 10:48

作者: 鎮(zhèn)壓    時間: 2025-3-31 17:24
0302-9743 14 the European Workshop on Dependable Computing, EWDC 2013, held in Coimbra, Portugal, in May 2013. The 9 full papers and 6 short papers presented were carefully reviewed and selected from 24 submissions. Also included in the volume are 6 fast abstracts presenting work in progress or new ideas in
作者: 里程碑    時間: 2025-3-31 20:48
Michael Singh,Cheryl Ballantyne of this framework, explaining why they are needed and what they provide. In order to illustrate how this middleware can be used and its potential benefits, we consider the well-known LQER routing protocol to show how it must be changed to incorporate probabilistic real-time requirements and meet them in a dependable way.
作者: Enrage    時間: 2025-3-31 23:57

作者: 牽索    時間: 2025-4-1 05:52
https://doi.org/10.1007/978-3-642-39753-0 into account the specificities of each domain. The resulting modeling framework serves primarily to capture the basic concepts of concerns related to component systems development based on the clear separation between the development process, interactions and the domain knowledge.




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
兴安盟| 共和县| 缙云县| 云浮市| 郓城县| 招远市| 六枝特区| 海盐县| 黎平县| 历史| 海林市| 土默特右旗| 乐业县| 阳新县| 江都市| 定兴县| 雷山县| 吉安市| 文成县| 白河县| 孝感市| 奉贤区| 红原县| 酉阳| 应城市| 武山县| 平江县| 谷城县| 天气| 濉溪县| 长治县| 江门市| 福海县| 杭州市| 阿拉善右旗| 渑池县| 六盘水市| 斗六市| 尼勒克县| 如东县| 古田县|