Search results

From Navigators

Jump to: navigation, search

  • Publication:Dixit11a
    |document=Document for Publication-Dixit11a.pdf ...e been proposed. In this paper we describe Adaptare - a complete framework for dependable QoS adaptation. We assume that during its lifetime, a system alt
    2 KB (279 words) - 17:36, 21 January 2013
  • Publication:Brandao2012reliabilityJBCS
    |document=Document for Publication-Brandao2012reliabilityJBCS.pdf ...echniques alone, but possible when they are combined. We advocate the need for thorougher system models, by showing vulnerabilities arising from incomplet
    1 KB (201 words) - 15:37, 23 January 2013
  • Publication:Craveiro12sapient
    |document=Document for Publication-Craveiro12sapient.pdf |title=Scheduling Analysis Principles and Tool for Time- and Space-Partitioned Systems
    1 KB (141 words) - 14:34, 3 December 2012
  • Publication:Air-final-report
    ...f modifications to be introduced in the RTEMS application production chain for the implementation of AIR-based systems (exemplified through a proof of con
    2 KB (224 words) - 13:00, 15 January 2013
  • Publication:Air-summary-report
    ...ization of RTEMS, the Real-Time Executive for Multiprocessor Systems. This document addresses: (i) the AIR architecture specification; (ii) the AIR support to
    1 KB (151 words) - 13:01, 15 January 2013
  • Publication:Craveiro12hssim
    |document=Document for Publication-Craveiro12hssim.pdf |booktitle=3rd International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS 2012)
    1 KB (203 words) - 14:59, 3 December 2012
  • Publication:Cogo12MSc
    |document=PEI-Cogo12MSc.pdf ... group properties supported by cloud providers or tools, and opportunities for cloud computing players contribute with diversity management area.
    2 KB (330 words) - 15:12, 17 January 2013
  • Publication:Joaosousa2011
    |document=Document for Publication-joaosousa2011.pdf |abstract=We present a new algorithm for state machine replication that is built around a leader-driven consensus pr
    995 B (129 words) - 10:49, 21 January 2013
  • Publication:Joaosousa2010
    |document=Document for Publication-joaosousa2010.pdf ...n, and also show expected values of latency in the state transfer protocol for states different sizes. Finally, as far as we know, this work is the first
    2 KB (269 words) - 10:49, 21 January 2013
  • Publication:CostaPBC11
    |document=CostaPBC11.pdf ...on Byzantine fault-tolerance paradigms. We believe this cost is acceptable for critical applications that require that level of fault tolerance.
    1 KB (184 words) - 15:42, 21 January 2013
  • Publication:Correia2012:CoC
    |document=Document for Publication-Correia2012-CoC.pdf |abstract=MapReduce is a framework for processing large data sets largely used in cloud computing. MapReduce imple
    1 KB (169 words) - 15:31, 21 January 2013
  • Publication:PedroCosta 2013
    |document=Document for Publication-PedroCosta 2013.pdf |abstract=MapReduce is often used for critical data processing, e.g., in the context of scientific or financial s
    1 KB (151 words) - 18:33, 31 January 2013
  • Publication:Padhy2011MiddlewarePoster
    |document=Document for Publication-Padhy2011MiddlewarePoster.pdf |title=Trustworthy and resilient monitoring system for cloud infrastructures
    1 KB (153 words) - 17:37, 21 January 2013
  • Publication:Dixit2012SAC
    |document=Document for Publication-Dixit2012SAC.pdf |abstract=Algorithms for solving distributed systems problems often use timeouts as a means to achie
    2 KB (265 words) - 17:36, 21 January 2013
  • Publication:Kreutz2012DAIS
    |document=Document for Publication-Kreutz2012DAIS.pdf |title=A Trustworthy and Resilient Event Broker for Monitoring Cloud Infrastructures
    1 KB (160 words) - 17:43, 21 January 2013
  • Publication:Nezhad2012DSN-FA
    |document=Document for Publication-Nezhad2012DSN-FA.pdf |title=A Multi-Layered Architecture for a Secure Virtualization Environment
    1 KB (146 words) - 18:48, 21 January 2013
  • Publication:Garcia msc11
    |document=Document for Publication-garcia msc11.pdf ... vulnerabilities occur in more than one OS. We found this number to be low for several combinations of OS.
    2 KB (314 words) - 17:48, 2 October 2018
  • Publication:Casimiro2012DCDV
    |document=Document for Publication-Casimiro2012DCDV.pdf |abstract=Cloud infrastructures play an increasingly important role for telecom operators, because they enable internal consolidation of resources
    2 KB (264 words) - 18:21, 21 January 2013
  • Publication:Garcia12 diversity
    |document=Document for Publication-garcia12 diversity.pdf
    2 KB (225 words) - 18:29, 21 January 2013
  • Publication:Marques2012ASCOMS
    |document=Document for Publication-Marques2012ASCOMS.pdf
    1 KB (207 words) - 18:40, 21 January 2013
  • Publication:Casimiro2012SSS
    |document=Document for Publication-Casimiro2012SSS.pdf |title=Brief Announcement: KARYON: Towards Safety Kernels for Cooperative Vehicular Systems
    2 KB (267 words) - 11:51, 5 February 2013
  • Publication:Araujo2012MGC
    |document=Document for Publication-Araujo2012MGC.pdf |title=Replication for dependability on virtualized cloud environments
    2 KB (245 words) - 19:06, 21 January 2013
  • Publication:Verissimo12tclouds
    |document=Document for Publication-verissimo12tclouds.pdf the same basic components, for example, intrusion-tolerant
    1 KB (136 words) - 14:53, 28 January 2013
  • Publication:Rosa11INDIN
    |document=Document for Publication-Rosa11INDIN.pdf ...stem applications at execution time. In this paper we present an algorithm for update application schedules, showing results from the proof-of-concept pro
    1 KB (181 words) - 17:10, 29 January 2013
  • Publication:Veronese13FTolerance
    |document=Document for Publication-Veronese13FTolerance.pdf ...utions the two algorithms run in the minimum number of communication steps for
    1 KB (203 words) - 15:10, 26 February 2013
  • Publication:Couto13Benchmarking
    |document=Document for Publication-Couto13Benchmarking.pdf |abstract=The increasing use of productivity and impact metrics for evaluation
    2 KB (248 words) - 14:37, 11 March 2013
  • Publication:Cogo13fitch
    |document=Document for Publication-Cogo13fitch.pdf ...ice replicas closer to their clients, obtain diversity in the replication (for resilience), recover compromised replicas, or rejuvenate ageing replicas. W
    2 KB (230 words) - 12:22, 9 August 2013
  • Publication:BFT-TO
    |document=Document for Publication-BFT-TO.pdf ... by replicating them in sets of servers. There have been several proposals for using SMR to tolerate arbitrary or Byzantine faults, including intrusions.
    1 KB (163 words) - 14:21, 19 June 2013
  • Publication:Kreutz13SDN
    |document=Document for Publication-Kreutz13SDN.pdf ...ovides new ways to solve long-standing problems in networking --- routing, for instance --- while simultaneously allowing the use of security and dependab
    2 KB (245 words) - 11:29, 27 June 2013
  • Publication:Craveiro13laxity
    |document=Document for Publication-Craveiro13laxity.pdf
    815 B (113 words) - 13:21, 1 April 2017
  • Publication:Malichevskyy15MSc
    |document=Document for Publication-Malichevskyy15MSc.pdf ...the last years has created the demand for authentication and authorization for these networks. The basic model usually requires a user, to access the netw
    2 KB (317 words) - 22:56, 11 July 2013
  • Publication:Craveiro13umpr
    |document=Document for Publication-Craveiro13umpr.pdf ...ource model; (iii) component abstraction guidelines to select the platform for the UMPR interface. We also briefly describe how we are dealing with the r
    1 KB (196 words) - 13:22, 1 April 2017
  • Publication:Atc13-durability
    |document=Usenix13-dsmr.pdf |abstract=State Machine Replication (SMR) is a fundamental tech- nique for ensuring the dependability of critical services in modern internet-scale in
    1 KB (215 words) - 17:04, 17 July 2014
  • Publication:NobregaDaCosta13safety
    |document=Document for Publication-NobregaDaCosta13safety.pdf |title=Safety Kernel for Cooperative Sensor-Based Systems
    2 KB (292 words) - 08:33, 13 August 2013
  • Publication:JSouza2013-LCN
    |document=Document for Publication-JSouza2013-LCN.pdf ...d on the analytical model, which is being integrated in the NS-2 simulator for validation. Reducing network inaccessibility is a crucial step to enable th
    2 KB (208 words) - 12:09, 23 May 2015
  • Publication:Botelho2014ewsdn
    |document=Document for Publication-Botelho2014ewsdn.pdf ..., and materialize it by proposing and formalizing a practical architecture for small to medium-sized networks. A central component of our design is a repl
    1 KB (218 words) - 01:48, 23 July 2015
  • Publication:JSouza2013-ECRTS
    |document=Document for Publication-JSouza2013-ECRTS.pdf ...less network standards, providing a set of fundamental abstractions useful for both system design and application programming.
    1 KB (168 words) - 10:51, 29 May 2015
  • Publication:Marques2013:a
    |document=SRDS-2013-Marques.pdf ... coordination, etc.) this problem cannot be ignored. Accordingly, we argue for, and show the efficacy of, using probabilistic models to characterize dynam
    2 KB (214 words) - 12:20, 20 November 2013
  • Publication:Casimiro2013karyon
    |document=Casimiro2013karyon.pdf ...KARYON contributions include improved simulation and fault-injection tools for evaluating safety assurance according to the ISO 26262 safety standard. The
    2 KB (304 words) - 11:23, 1 April 2017
  • Publication:Alves2013
    |document=Alves2013.pdf |title=Middleware Support for Adaptive Real-Time Applications in Wireless Sensor Networks
    1 KB (148 words) - 12:39, 20 November 2013
  • Publication:Jesus2013
    |document=Jesus2013.pdf ...o external disturbances affecting data accuracy. In this paper we motivate for the need of dependable data collection in harsh coastal and marine environm
    1 KB (188 words) - 12:45, 20 November 2013
  • Publication:AGuerreio2013-INFORUM
    |document=Document for Publication-AGuerreio2013-INFORUM.pdf |title=Improving NS-2 Network Simulator for IEEE 802.15.4 Standard Operation
    1 KB (190 words) - 10:43, 29 May 2015
  • Publication:AGUEREIRO-2014-SENSORNETS
    |document=Document for Publication-AGUEREIRO-2014-SENSORNETS.pdf
    1 KB (161 words) - 02:20, 23 July 2015
  • Publication:Almeida2013Inforum
    |document=Document for Publication-Almeida2013Inforum.pdf This paper addresses the definition and design of fault-detection mechanisms for TSP hypervisors, covering both time and space domains. In spite of our focu
    1 KB (159 words) - 13:18, 1 April 2017
  • Publication:SP13:eBiobanking
    |document=Document for Publication-SP13-eBiobanking.pdf
    386 B (48 words) - 16:18, 21 January 2014
  • Publication:Craveiro13PhD
    |document=Document for Publication-Craveiro13PhD.pdf ...a compromise with size, weight and power consumption (SWaP), and open room for supporting self-adaptive behavior. To allow applying our results to a more
    2 KB (355 words) - 13:28, 17 February 2015
  • Publication:JsouzaRTN14
    |document=Document for Publication-JsouzaRTN14.pdf |title=Low Level Error Detection For Real-Time Wireless Communications
    2 KB (225 words) - 02:00, 23 July 2015
  • Publication:RCPinto2014rv
    |document=Document for Publication-RCPinto2014rv.pdf ... handling deviations from specification. Although this approach is fitting for some domains, it can have a nefarious influence in embedded real-time syste
    2 KB (210 words) - 11:50, 23 July 2014
  • Publication:Cogo14biobank
    |document=Publication-Cogo14biobankPoster.pdf |title=BiobankCloud - Platform as a Service for Biobanking
    1 KB (160 words) - 14:48, 22 April 2016
  • Publication:Sousa2013wan-evaluation
    |document=Document for Publication-Sousa2013wan-evaluation.pdf
    857 B (110 words) - 15:51, 16 January 2017

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

Views
Personal tools
Toolbox
Navigators toolbox