標(biāo)題: Titlebook: Dependable Computing; 14th European Worksh Marco Vieira,Jo?o Carlos Cunha Conference proceedings 2013 Springer-Verlag Berlin Heidelberg 201 [打印本頁] 作者: Jefferson 時間: 2025-3-21 16:12
書目名稱Dependable Computing影響因子(影響力)
書目名稱Dependable Computing影響因子(影響力)學(xué)科排名
書目名稱Dependable Computing網(wǎng)絡(luò)公開度
書目名稱Dependable Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Dependable Computing被引頻次
書目名稱Dependable Computing被引頻次學(xué)科排名
書目名稱Dependable Computing年度引用
書目名稱Dependable Computing年度引用學(xué)科排名
書目名稱Dependable Computing讀者反饋
書目名稱Dependable Computing讀者反饋學(xué)科排名
作者: alleviate 時間: 2025-3-21 23:07
A Dependable Alternative to the Spanning Tree Protocolescribes the main characteristics, processes and mechanisms of SCS, presents some lab and simulation experiments with STP and SCS, and provides demonstrations that SCS provides a more reliable service than STP variants, and a more cost effective alternative to TRILL and SPB network dependability.作者: 傲慢人 時間: 2025-3-22 00:26 作者: Inculcate 時間: 2025-3-22 06:37
Perturbation Methods: Framework and Toolsescribes the main characteristics, processes and mechanisms of SCS, presents some lab and simulation experiments with STP and SCS, and provides demonstrations that SCS provides a more reliable service than STP variants, and a more cost effective alternative to TRILL and SPB network dependability.作者: 盡忠 時間: 2025-3-22 09:19
Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Treesthe sensor network is protected from cyber-security threats. In this paper we present a new IDS architecture designed to ensure a trade-off between different requirements: high detection rate is obtained through decision tree classification; energy saving is obtained through light detection techniqu作者: intricacy 時間: 2025-3-22 16:03 作者: intricacy 時間: 2025-3-22 17:53 作者: 詢問 時間: 2025-3-23 01:06
Model-Driven Evaluation of User-Perceived Service Availability system design. However, it remains difficult to evaluate dependability of such distributed and heterogeneous functionality as it depends highly on the properties of the enabling information and communications technology (ICT) infrastructure. Moreover, every specific pair service client and provider作者: Calculus 時間: 2025-3-23 01:41 作者: Colonnade 時間: 2025-3-23 06:46 作者: 飲料 時間: 2025-3-23 11:11 作者: 音樂學(xué)者 時間: 2025-3-23 17:52 作者: 類型 時間: 2025-3-23 18:10 作者: 幾何學(xué)家 時間: 2025-3-24 01:14 作者: 提煉 時間: 2025-3-24 04:48 作者: Audiometry 時間: 2025-3-24 06:35 作者: 決定性 時間: 2025-3-24 10:49
A Dependable Alternative to the Spanning Tree Protocole replacement of STP variants, most of them proprietary and with limited scope of operation. The recent protocols, IETF TRILL and IEEE SPB, target mainly data center networks, are based on complex concepts, require great processing power from switches and huge investment in new gear..In this paper w作者: accrete 時間: 2025-3-24 17:18
Understanding (Mis)Information Spreading for Improving Corporate Network Trustworthinesss employees at the lower levels in the organization chart may become influential thanks to social connections. This unexpected influence could be dangerous if the employee behaves maliciously reducing thus the trustworthiness of the overall organization. The paper is a first attempt in understanding作者: 生命 時間: 2025-3-24 22:44
Software Component Replication for Improved Fault-Tolerance: Can Multicore Processors Make It Work?at may lead to the application failure. In this work we revisit the idea of software component replication for masking software bugs in the context of multi-core systems. We propose a new abstraction: a .. A . is a software component that includes several internal replicas with diverse implementatio作者: Ceremony 時間: 2025-3-25 02:55 作者: Expostulate 時間: 2025-3-25 06:05 作者: Decongestant 時間: 2025-3-25 08:39
Towards Dependable Measurements in Coastal Sensors Networkshe system is to achieve reliable flood protection and response. This is challenging because of the inherent presence of a cascade of uncertainties in the forecast models, and also uncertainties affecting the timeliness and quality of raw sensor data that is used in the forecasting processes. Achievi作者: ACTIN 時間: 2025-3-25 13:26 作者: 態(tài)度暖昧 時間: 2025-3-25 17:07
Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Treeses on the motes. A dataset including sinkhole attack has been created and employed to evaluate the effectiveness of the proposed solution. Such a dataset has been made available, and will facilitate future comparisons of alternative solutions.作者: cloture 時間: 2025-3-25 22:47 作者: Legion 時間: 2025-3-26 02:57 作者: 一罵死割除 時間: 2025-3-26 07:14 作者: travail 時間: 2025-3-26 12:12
Open Challenges in the Resilience Evaluation of Ad Hoc Networksc networks. This paper focuses on identifying these challenges to provide potential evaluators with a guide of the sensitive points that require an especial attention to improve the credibility of results when addressing the resilience evaluation of ad hoc networks.作者: 秘方藥 時間: 2025-3-26 14:33 作者: 猛擊 時間: 2025-3-26 19:36
Conference proceedings 2013l, in May 2013. The 9 full papers and 6 short papers presented were carefully reviewed and selected from 24 submissions. Also included in the volume are 6 fast abstracts presenting work in progress or new ideas in the dependability area. The papers are organized in topical sections on wireless senso作者: Contend 時間: 2025-3-26 21:44 作者: Nefarious 時間: 2025-3-27 02:49 作者: 易于出錯 時間: 2025-3-27 07:22
https://doi.org/10.1007/978-3-642-51512-5the network by means of Software Defined Networking approach. The paper presents the architecture we have in mind and that will be deployed and validated against a real world distributed Air Traffic Control system, for which missing dependability and security targets would result in huge business and human losses.作者: 即席演說 時間: 2025-3-27 10:15 作者: 爭議的蘋果 時間: 2025-3-27 17:31 作者: 鍍金 時間: 2025-3-27 18:39
Formal Analysis of Dynamic Domain Establishment Protocol in Cloud Logging Servicenformation leakage problem, to solve this problem we propose a modification of the protocol by adding a key update protocol. After these modifications, this protocol has been verified with AVISPA to be safe from these two attacks.作者: 深陷 時間: 2025-3-28 01:12 作者: Hangar 時間: 2025-3-28 03:06 作者: VICT 時間: 2025-3-28 07:40
Intercept: Profiling Windows Network Device Driversreverse engineering. Experiments using Ethernet, Wi-Fi and Bluetooth device drivers show that Intercept is able to record function calls, parameters and return values, with small overheads even when the device driver under test is subject to a heavy workload.作者: 炸壞 時間: 2025-3-28 11:35
Towards Dependable Measurements in Coastal Sensors Networksd marine environments, we overview the main challenges that need to be addressed and we introduce some initial ideas on what needs to be done in order to deal with external disturbances causing faulty measurements.作者: integrated 時間: 2025-3-28 16:33 作者: eulogize 時間: 2025-3-28 19:13 作者: 形容詞詞尾 時間: 2025-3-29 02:52
Solid Mechanics and Its Applications and it is a single point of failure. In this context we examined Network Time Protocol (NTP) as an alternative time source when the GPS receiver is compromised. In this paper a resilient architecture is proposed that is able to detect and react to the GPS spoofing attack. Experimental tests have shown the effectiveness of our solution.作者: Ruptured-Disk 時間: 2025-3-29 05:13
Nonlinear Equations and Optimizationurrently, thus incurring in minimal overhead. Also, by exploring the multiple existent implementations of well-known interfaces, it is possible to use the idea without incurring in additional development cost.作者: 靦腆 時間: 2025-3-29 09:23
The Challenge of Detection and Diagnosis of Fugacious Hardware Faults in VLSI Designses like radiation, suffering from wear-out, or being affected by an intermittent fault. Upon detection, systems may react to adapt the deployed fault tolerance mechanisms to the diagnosed problem. This paper explores these ideas evaluating challenges and requirements involved, and provides an outline of potential techniques to be applied.作者: indicate 時間: 2025-3-29 14:30 作者: Ligneous 時間: 2025-3-29 18:22 作者: Dna262 時間: 2025-3-29 23:42 作者: Osmosis 時間: 2025-3-30 01:45
Middleware Support for Adaptive Real-Time Applications in Wireless Sensor Networks of this framework, explaining why they are needed and what they provide. In order to illustrate how this middleware can be used and its potential benefits, we consider the well-known LQER routing protocol to show how it must be changed to incorporate probabilistic real-time requirements and meet them in a dependable way.作者: thalamus 時間: 2025-3-30 06:40
Issues and Ongoing Work on State-Driven Workload Generation for Distributed Systemss is nontrivial due to system complexity and non-deterministic factors. This work discusses our ongoing work on a state-driven workload generation approach for distributed systems, based on an evolutionary algorithm, and its preliminary implementation for testing a fault-tolerant distributed system for flight data processing.作者: 發(fā)炎 時間: 2025-3-30 11:58
GRIMACE: GeneRIc MetAmodel for Domain Component modElling into account the specificities of each domain. The resulting modeling framework serves primarily to capture the basic concepts of concerns related to component systems development based on the clear separation between the development process, interactions and the domain knowledge.作者: SLUMP 時間: 2025-3-30 13:29
Conference proceedings 2013re 6 fast abstracts presenting work in progress or new ideas in the dependability area. The papers are organized in topical sections on wireless sensor networks; cloud computing and services; testing and fault detection, fault injection and benchmarking and dependable and secure computing.作者: 外向者 時間: 2025-3-30 17:49 作者: Shuttle 時間: 2025-3-31 00:16 作者: miracle 時間: 2025-3-31 02:36
Perturbation Methods: Solutions this phenomenon by proposing a model for corporate networks that is able to measure the influence of each employee on the overall organizational chart, that is, to which extent an employee is able to spread (mis)information through the corporate network. The evaluation is done considering the Enron case.作者: Prologue 時間: 2025-3-31 06:37 作者: BLANC 時間: 2025-3-31 10:48 作者: 鎮(zhèn)壓 時間: 2025-3-31 17:24
0302-9743 14 the European Workshop on Dependable Computing, EWDC 2013, held in Coimbra, Portugal, in May 2013. The 9 full papers and 6 short papers presented were carefully reviewed and selected from 24 submissions. Also included in the volume are 6 fast abstracts presenting work in progress or new ideas in 作者: 里程碑 時間: 2025-3-31 20:48
Michael Singh,Cheryl Ballantyne of this framework, explaining why they are needed and what they provide. In order to illustrate how this middleware can be used and its potential benefits, we consider the well-known LQER routing protocol to show how it must be changed to incorporate probabilistic real-time requirements and meet them in a dependable way.作者: Enrage 時間: 2025-3-31 23:57 作者: 牽索 時間: 2025-4-1 05:52
https://doi.org/10.1007/978-3-642-39753-0 into account the specificities of each domain. The resulting modeling framework serves primarily to capture the basic concepts of concerns related to component systems development based on the clear separation between the development process, interactions and the domain knowledge.