نتایج جستجو برای: resilient behavior

تعداد نتایج: 633157  

Journal: :EAI Endorsed Trans. Energy Web 2013
Adrian V. Gheorghe Dan V. Vamanu

Physical analogies emphasizing cooperative behavior in systems are explored and integrated into so called 'serious energy games', to contribute in a better understanding, monitoring and good governance of some of the complex security issues confronting the evolvement of contemporary energy systems. It is believed that such exercises might be supportive in the necessary attempt, by the many stak...

2005
Toshimitsu Masuzawa Sébastien Tixeuil

Self-stabilizing protocols can tolerate any type and any number of transient faults. However, in general, self-stabilizing protocols provide no guarantee about their behavior against permanent faults. This paper proposes a self-stabilizing link-coloring protocol resilient to (permanent) Byzantine faults in arbitrary networks. The protocol assumes the central daemon, and uses 2∆ − 1 colors where...

2000
David Evans

Computing is rapidly moving away from traditional computers. Of the 8 billion computing units will be deployed worldwide this year, only 150 million are stand-alone computers [Tennenhouse2000]. Many programs in the future will run on collections of mobile processors interacting with the physical world and communicating over dynamic, ad hoc networks. We can view such a collection of devices as a...

2013
Karine Altisen Stéphane Devismes Raphaël Jamet Pascal Lafourcade

We propose SR3, a secure and resilient algorithm for convergecast routing in WSNs. SR3 uses lightweight cryptographic primitives to achieve data confidentiality and data packet unforgeability. SR3 has a security proven by formal tool. We made simulations to show the resiliency of SR3 against various scenarios, where we mixed selective forwarding, blackhole, wormhole, and Sybil attacks. We compa...

Journal: :Science 2005
Anyuan Cao Pamela L Dickrell W Gregory Sawyer Mehrdad N Ghasemi-Nejhad Pulickel M Ajayan

We report that freestanding films of vertically aligned carbon nanotubes exhibit super-compressible foamlike behavior. Under compression, the nanotubes collectively form zigzag buckles that can fully unfold to their original length upon load release. Compared with conventional low-density flexible foams, the nanotube films show much higher compressive strength, recovery rate, and sag factor, an...

2008
Ronen Gradwohl

We argue that in distributed mechanism design frameworks it is important to consider not only rational manipulation by players, but also malicious, faulty behavior. To this end, we show that in some instances it is possible to take a centralized mechanism and implement it in a distributed setting in a fault tolerant manner. More specifically, we examine two distinct models of distributed mechan...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی مهندسی 1385

خریداران عموماً در مورد کالاها براساس ویژگیهای بیرونی (extrinsic cues) آنها قضاوت می کنند ، به ویژه هنگامیکه سنجش ویژگیهای ذاتی کالا مشکل باشد. به همین علت است که کشـور سـازنده کـالـا، (country of origin or coo) ، یکی از این ویژگیهای بیرونی محصول ، عموماً برای ارزیابی کالاهای خارجی مورد استفاده قرار میگیرد. اثرات کشور سازنده کالا در حوزه رفتار خرید مصرف کننده (consumer buying behavior)بطور گسترده...

Arash Shishehian, Majid Naser Khaki,

Background and Aim: Different attachment designs have been developed to connect implant to natural teeth in partial dentures; however, adequate studies have not been performed to determine stress distribution patterns in these designs. The present study aimed to assess stress distribution patterns in natural tooth and implant supported removable partial denture with different attachment designs...

2008
Heewan Park Seokwoo Choi Hyun-il Lim Taisook Han

Software birthmark is the inherent program characteristics that can identify a program. In this paper, we propose a static API trace birthmark to detect Java theft. Because the API traces can reflect the behavior of a program, our birthmark is more resilient than the existing static birthmarks. Because the API traces are extracted by static analysis, they can be applied to library programs whic...

2003
Andreas Kirstädter Axel Hof Walter Meyer Erwin Wolf

Network processors offer a new flexibility for network applications and reduce the time to market for data processing systems. In this paper, we describe the changed development process of the data plane using the Motorola C-5 Network Processor. We implemented a Resilient Packet Ring line card for a SDH cross connect. We show a solution for the support of different Quality of Service classes wi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید