A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
Practitioners in CPS take availability into consideration, programming applications in a failure-aware fashion. First, application-based QoS policies replace old node-based ones. ... Models in GC q can accommodate in this way application-based QoS policies, instead of a node-centric approach. Our second contribution relates to the verification of failure-aware protocols. ... López has benefitted from travel support by the EU COST Action IC1201: Behavioural Types for Reliable Large-Scale Software Systems (BETTY). ...doi:10.1007/978-3-319-39570-8_13 fatcat:pm7zmek7pzb2dpjqa4gphrujtq
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture - MobiArch '08
failure or under attacks. ... In this position paper, we present a new trust architecture and model -Situation-Aware Trust (SAT) -to address several important trust issues in vehicular networks that we believe are essential to overcome ... This property is very useful in a vehicular communication system, since a vehicle usually does not care which entity it communicates with. ...doi:10.1145/1403007.1403015 fatcat:a5plyyoaujahvpqnb5zi4bobaa
2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference
Many rules enforced in different ways by different systems. Information is distributed -users may not be aware of where information is located, who owns information, etc.. ... Software engineering in a DBE System of systems. System instantiation involves cooperation and communication between entities in the ecosystem. Evolution Uncontrollable! ... . Their adoption is dependent on users trusting the resultant socio-technical systems. Failure by researchers and practitioners to design for failure will inevitable lead to the failure of the vision ...doi:10.1109/dest.2007.371934 fatcat:jkwdzosi3bcnrnwnwa5scree3i
Peace Research Abstracts Journal
Beyond privacy: confronting locational surveil- lance in wireless communication. Communication Law and Policy 8(1):1-23, 2003. COMMUNICATION. PRIVACY. WIRELESS SYSTEMS. ... These data also become available to law enforcement agents. Social repercussions include a shift in the power of individual and institutional actors to create types of places and types of persons. ...
One of the critical challenges is resiliency: disruptions due to failures (either accidental or because of disasters or attacks) may entail significant revenue losses (e.g., US$ 25.5 billion in 2010 for ... Such failures may originate at any of the major components in a cloud architecture (and propagate to others): (i) the servers hosting the application, (ii) the network interconnecting them (on different ... A similar approach to enforce resilient objects placement is "availability-aware MapReduce data placement mechanism" (ADAPT)  . ...doi:10.1109/comst.2016.2531104 fatcat:vzvkai7nkrbbda63fesn7zw4di
Criminal Justice Digest
available resources. ... Public law enforcement officials also have the responsibility of helping the business community create an atmosphere of awareness and knowledge of local and state laws which affect their daily opera- tion ...
This workshop, the First ICSE Workshop on ULS systems, has several goals: to raise awareness of ULS systems in the ICSE community; to further our understanding of the characteristics of such systems; to ... explore the unique research problems of ULS systems; to help foster a community who study and build ULS systems; and to understand the role and the shortcomings of traditional software engineering concepts ... Workshop Goals This workshop, the First ICSE Workshop on ULS systems, has several goals: to raise awareness of ULS systems in the ICSE community; to further our understanding of the characteristics of ...doi:10.1109/icsecompanion.2007.85 dblp:conf/icse/GabrielKNSS07 fatcat:f5zxdcsjwffvjhkkxzdxuruszy
Recent advancements in the field of smart machine-to-machine (M2M) communications impose the necessity to improve the service delivery by enforcing appropriate security rules. ... It is shown that the policy enforcement enables enhanced security management capabilities, increased agility, and better service levels in the field of smart M2M communications. ... ACKNOWLEDGMENT The research presented in this paper has been partly supported by the Erasmus+ project Open Models Initiantive -OMI, Key Activity 2. ...arXiv:1706.04803v2 fatcat:zvi2xnu26zbadbr4ffjxye6lfu
To achieve scalability, our service uses Hadoop MapReduce to perform parallel management tasks, such as data encryption and decryption, key distribution and retention policy enforcement. ... To achieve scalability, our service uses Hadoop MapReduce to perform parallel management tasks, such as data encryption and decryption, key distribution and retention policy enforcement. ... Failures can include (1) communication failure to backend structured data stores, (2) failure to local file systems; (3) communication failure to HDFS; and (4) crash of machines and processes. ...doi:10.1109/inm.2011.5990674 dblp:conf/im/LiSSK11 fatcat:w65v5lzp7jec5oebgvp5grrjd4
Bandwidth allocation and enforcement in tactical networks is a challenging problem. ... In addition, both network topology and availability of network resources vary rapidly in the mobile ad-hoc scenario. ... In the context of data-aware publishsubscribe systems, it opportunistically allocates computational resources in the network while taking into consideration load, connectivity, and bandwidth availability ...doi:10.1109/milcom.2006.302213 fatcat:b44y7ox4zzgi7pxmy3qcc4evyi
The reaction of each failure of repression is to extend it still further, drawing in landlords, ... In many instances, a particular activity is criminalized precisely because of the lack of real community moral consensus. ...
If it fails to function—as in many cases it does—the whole safety program may be inefficient and ineffective. Yet no one is immediately aware of the source of the failure. ... Current weaknesses in the field of accident records are due in part to the absence of any external evidence of the functioning of an accident-records system. ...
Environmental education would be the key essence in curbing river pollution via the adoption of nature- oriented approach, bottom-up approach and establishment of a central river information system. ... As a result, data derived shown the key factor underlying the cause of river pollution is human factor with low awareness, information and knowledge leading to the lack of sensitivity in river restoration ... At present, the only water information system available in Malaysia is known as InfoBanjir (DID, 2005 ) that provides real-time flood information. ...doi:10.3303/cet1545125 doaj:7a4161d47521414fb1657a40561bede3 fatcat:yrhe2cowpjc7fezwsjdywicsci
In such settings, it is reasonable to assume that the overhearing resources will be essentially limited, thus allowing the overhearing agent to overhear only a subset of inter-agent communications. ... The restriction of selectivity is mainly compelled by the specific characteristics of large-scale multi-agent systems. ... We implement the automatization and deautomatization cognitive functions as a self-organizing system in the IDA framework. ...doi:10.1017/s0269888909990245 fatcat:2nznvrrw3ffadj7qdegncbcfee
Providing successful end to end communication in mobile ad hoc networks is a challenging task. ... In this paper, we aim at providing a bandwidth aware multipath reactive routing protocol for mobile ad hoc networks. ... The proposed protocol BAMR requires less information for estimation of link failure rate and finds bandwidth aware paths in network for communication. ...doi:10.1504/ijscc.2018.088338 fatcat:o7mmml7hnjgq5bmoqj5526ndo4
« Previous Showing results 1 — 15 out of 166,453 results