نتایج جستجو برای: survivable

تعداد نتایج: 967  

Journal: :Journal of Optical Communications and Networking 2011

1999
Ala Eddine Barouni Ali Jaoua Nejib Zaguia

We present algorithms for the drawing of survivable telecommunication networks. The visualization of telecommunication networks is a very important problem. For some specific rings in a network, we may have a high traffic. The network designers may decide to add more equipment to the nodes (sites) of these rings in order to increase the performance of the network. Therefore, one of the most imp...

Journal: :Optical Switching and Networking 2005
Frederick Ducatelle Luca Maria Gambardella

In IP-over-WDM networks, a logical IP network is routed on top of a physical optical fiber network. An important challenge hereby is to make the routing survivable. We call a routing survivable if the connectivity of the logical network is guaranteed in case of a failure in the physical network. In this paper we describe FastSurv, a local search algorithm for survivable routing. The algorithm w...

Journal: :Stroke 1989
P D Purdy M D Devous H H Batjer C L White Y Meyer D S Samson

A new canine model of focal cerebral ischemia has been developed employing intravascular delivery of microfibrillar collagen via femoral catheterization. In 13 dogs, dose-effect studies showed neurologic deficits (ranging from mild hemiparesis to death) related to the dose of microfibrillar collagen delivered. In another 10 dogs, 0.5 ml of 60 mg/ml microfibrillar collagen was injected into the ...

2002
Hossein Izadpanah Tamer ElBatt Greg Tangonan

We introduce an “all weather survivable” optical/mm-wave wireless access and distribution network architecture and examine the merits of various techniques for enhancing the network availability, namely hybrid link protection, dynamic load switching, and multi-hop routing.

2003
JAMES L. SIDORAN John Rushby Dawn Xiaodong Song Jonathan K. Millen Veronique Cortier

We present an approach to provide a fault-tolerant and secure service for sealed-bid auctions. The solution is designed for a loosely coupled publish-subscribe system. It employs multiple auction servers and achieves validity and security properties through application of secret-sharing methods and public-key encryption and signatures. It can tolerate Byzantine failures of one third of the auct...

1998
Dahlia Malkhi Michael K. Reiter

Reaching consensus among multiple processes in a distributed system is fundamental to coordinating distributed actions. In this paper we present a new approach to building survivable consensus objects in a system consisting of a (possibly large) collection of persistent object servers and a transient population of clients. Our consensus object implementation requires minimal support from server...

2000
T. Bowen D. Chee M. Segal R. Sekar T. Shanbhag P. Uppuluri

Reliance on networked information systems to support critical infrastructures prompts interest in making network information systems survivable, so that they continue functioning even when under attack. To build survivable systems, attacks must be detected and reacted to before they impact performance or functionality. Previous survivable systems research focussed primarily on detecting intrusi...

2013
SOHAIB AHMAD

In general, Security techniques pursue two defense lines: one preventive and the second one is reactive6. The first one offers techniques to circumvent any type of Attack, as firewalls and cryptographic systems. The second consists in getting act on demand to lessen Intrusions, as Intrusion Detection systems. This paper observes Survivable approaches whose purpose is to facilitate network s to ...

2002
Mohammad Samarah James Whittaker

Although there is a large body of work on cryptographic techniques and algorithms that provide basic building blocks to solve specific security problems, relatively little work has been done in investigating security issues in mobile system contexts. Conventional security controls work well for static code, but breakdown with code mobility. In this paper, we investigate the need for endto-end s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید