- Publication:Casimiro2012SSS
|document=Document for Publication-Casimiro2012SSS.pdf
|title=Brief Announcement: KARYON: Towards Safety Kernels for Cooperative Vehicular Systems
2 KB (267 words) - 11:51, 5 February 2013
- Publication:Araujo2012MGC
|document=Document for Publication-Araujo2012MGC.pdf
|title=Replication for dependability on virtualized cloud environments
2 KB (245 words) - 19:06, 21 January 2013
- Publication:Verissimo12tclouds
|document=Document for Publication-verissimo12tclouds.pdf
the same basic components, for example, intrusion-tolerant
1 KB (136 words) - 14:53, 28 January 2013
- Publication:Rosa11INDIN
|document=Document for Publication-Rosa11INDIN.pdf
...stem applications at execution time. In this paper we present an algorithm for update application schedules, showing results from the proof-of-concept pro
1 KB (181 words) - 17:10, 29 January 2013
- Publication:Veronese13FTolerance
|document=Document for Publication-Veronese13FTolerance.pdf
...utions the two algorithms run in the minimum number of communication steps for
1 KB (203 words) - 15:10, 26 February 2013
- Publication:Couto13Benchmarking
|document=Document for Publication-Couto13Benchmarking.pdf
|abstract=The increasing use of productivity and impact metrics for evaluation
2 KB (248 words) - 14:37, 11 March 2013
- Publication:Cogo13fitch
|document=Document for Publication-Cogo13fitch.pdf
...ice replicas closer to their clients, obtain diversity in the replication (for resilience), recover compromised replicas, or rejuvenate ageing replicas. W
2 KB (230 words) - 12:22, 9 August 2013
- Publication:BFT-TO
|document=Document for Publication-BFT-TO.pdf
... by replicating them in sets of servers. There have been several proposals for using SMR to tolerate arbitrary or Byzantine faults, including intrusions.
1 KB (163 words) - 14:21, 19 June 2013
- Publication:Kreutz13SDN
|document=Document for Publication-Kreutz13SDN.pdf
...ovides new ways to solve long-standing problems in networking --- routing, for instance --- while simultaneously allowing the use of security and dependab
2 KB (245 words) - 11:29, 27 June 2013
- Publication:Craveiro13laxity
|document=Document for Publication-Craveiro13laxity.pdf
815 B (113 words) - 13:21, 1 April 2017
- Publication:Malichevskyy15MSc
|document=Document for Publication-Malichevskyy15MSc.pdf
...the last years has created the demand for authentication and authorization for these networks. The basic model usually requires a user, to access the netw
2 KB (317 words) - 22:56, 11 July 2013
- Publication:Craveiro13umpr
|document=Document for Publication-Craveiro13umpr.pdf
...ource model; (iii) component abstraction guidelines to select the platform for the UMPR interface. We also briefly describe how we are dealing with the r
1 KB (196 words) - 13:22, 1 April 2017
- Publication:Atc13-durability
|document=Usenix13-dsmr.pdf
|abstract=State Machine Replication (SMR) is a fundamental tech- nique for ensuring the dependability of critical services in modern internet-scale in
1 KB (215 words) - 17:04, 17 July 2014
- Publication:NobregaDaCosta13safety
|document=Document for Publication-NobregaDaCosta13safety.pdf
|title=Safety Kernel for Cooperative Sensor-Based Systems
2 KB (292 words) - 08:33, 13 August 2013
- Publication:JSouza2013-LCN
|document=Document for Publication-JSouza2013-LCN.pdf
...d on the analytical model, which is being integrated in the NS-2 simulator for validation. Reducing network inaccessibility is a crucial step to enable th
2 KB (208 words) - 12:09, 23 May 2015
- Publication:Botelho2014ewsdn
|document=Document for Publication-Botelho2014ewsdn.pdf
..., and materialize it by proposing and formalizing a practical architecture for small to medium-sized networks. A central component of our design is a repl
1 KB (218 words) - 01:48, 23 July 2015
- Publication:JSouza2013-ECRTS
|document=Document for Publication-JSouza2013-ECRTS.pdf
...less network standards, providing a set of fundamental abstractions useful for both system design and application programming.
1 KB (168 words) - 10:51, 29 May 2015
- Publication:Marques2013:a
|document=SRDS-2013-Marques.pdf
... coordination, etc.) this problem cannot be ignored. Accordingly, we argue for, and show the efficacy of, using probabilistic models to characterize dynam
2 KB (214 words) - 12:20, 20 November 2013
- Publication:Casimiro2013karyon
|document=Casimiro2013karyon.pdf
...KARYON contributions include improved simulation and fault-injection tools for evaluating safety assurance according to the ISO 26262 safety standard. The
2 KB (304 words) - 11:23, 1 April 2017
- Publication:Alves2013
|document=Alves2013.pdf
|title=Middleware Support for Adaptive Real-Time Applications in Wireless Sensor Networks
1 KB (148 words) - 12:39, 20 November 2013