-
2
-
-
0035120939
-
Toward self-healing energy infrastructure systems
-
Amin, M.: Toward self-healing energy infrastructure systems. IEEE Comput. Appl. Power 14(1), 20-28 (2001)
-
(2001)
IEEE Comput. Appl. Power
, vol.14
, Issue.1
, pp. 20-28
-
-
Amin, M.1
-
4
-
-
36949009831
-
DTN routing as a resource allocation problem
-
Balasubramanian, A., Levine, B., Venkataramani, A.: DTN routing as a resource allocation problem. SIGCOMM Comput. Commun. Rev. 37(4), 373-384 (2007)
-
(2007)
SIGCOMM Comput. Commun. Rev
, vol.37
, Issue.4
, pp. 373-384
-
-
Balasubramanian, A.1
Levine, B.2
Venkataramani, A.3
-
5
-
-
70349346349
-
The opportunities and limits of technology in non profit disaster response
-
Keynote speech at the, Washington May
-
Becker, J.C.: The opportunities and limits of technology in non profit disaster response. Keynote speech at the ISCRAM conference, Washington (May 2008)
-
(2008)
ISCRAM conference
-
-
Becker, J.C.1
-
6
-
-
70349351278
-
-
Bengtsson, A., Westerdahl, L.: Access control in a coalition system. Technical Report FOIR- 2393-SE, Swedish Defence Research Agency (December 2007)
-
Bengtsson, A., Westerdahl, L.: Access control in a coalition system. Technical Report FOIR- 2393-SE, Swedish Defence Research Agency (December 2007)
-
-
-
-
7
-
-
0035402080
-
Technology challenges for virtual overlay networks
-
Birman, K.: Technology challenges for virtual overlay networks. IEEE Transactions on Systems, Man and Cybernetics, Part A 31(4), 319-327 (2001)
-
(2001)
IEEE Transactions on Systems, Man and Cybernetics, Part A
, vol.31
, Issue.4
, pp. 319-327
-
-
Birman, K.1
-
8
-
-
21244452845
-
Overcoming communications challenges in software for monitoring and controlling power systems
-
Birman, K., Chen, J., Hopkinson, E., Thomas, R., Thorp, J., Van Renesse, R., Vogels, W.: Overcoming communications challenges in software for monitoring and controlling power systems. Proc. IEEE 93(5), 1028-1041 (2005)
-
(2005)
Proc. IEEE
, vol.93
, Issue.5
, pp. 1028-1041
-
-
Birman, K.1
Chen, J.2
Hopkinson, E.3
Thomas, R.4
Thorp, J.5
Van Renesse, R.6
Vogels, W.7
-
10
-
-
24744432675
-
Self-policing mobile ad hoc networks by reputation systems.IEEE
-
Buchegger, S., Le Boudec, J.: Self-policing mobile ad hoc networks by reputation systems.IEEE Communications Magazine 43(7), 101-107 (2005)
-
(2005)
Communications Magazine
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Le Boudec, J.2
-
11
-
-
39549122592
-
Pervasive software environments for supporting disaster responses
-
Catarci, T., de Leoni, M., Marrella, A., Mecella, M., Salvatore, B., Vetere, G., Dustdar, S.,Juszczyk, L., Manzoor, A., Truong, H.-L.: Pervasive software environments for supporting disaster responses. IEEE Internet Comput. 12(1), 26-37 (2008)
-
(2008)
IEEE Internet Comput
, vol.12
, Issue.1
, pp. 26-37
-
-
Catarci, T.1
de Leoni, M.2
Marrella, A.3
Mecella, M.4
Salvatore, B.5
Vetere, G.6
Dustdar, S.7
Juszczyk, L.8
Manzoor, A.9
Truong, H.-L.10
-
12
-
-
70349346347
-
-
CRUTIAL
-
CRUTIAL. European FP6 project, http://crutial.cesiricerca.it/
-
European FP6 project
-
-
-
13
-
-
33745188428
-
Hastily formed networks
-
Denning, P.J.: Hastily formed networks. Commun. ACM 49(4), 15-20 (2006)
-
(2006)
Commun. ACM
, vol.49
, Issue.4
, pp. 15-20
-
-
Denning, P.J.1
-
17
-
-
34547351606
-
Vehicular mobility simulation for VANETs
-
ANSS
-
Fiore, M., Harri, J., Filali, F., Bonnet, C.: Vehicular mobility simulation for VANETs. In: Proc. 40th Annual Simulation Symposium (ANSS) (2007)
-
(2007)
Proc. 40th Annual Simulation Symposium
-
-
Fiore, M.1
Harri, J.2
Filali, F.3
Bonnet, C.4
-
19
-
-
50649083511
-
Wireless medical sensor networks in emergency response: Implementation and pilot results
-
IEEE, Los Alamitos
-
Gao, T., Pesto, C., Selavo, L., Chen, Y., Ko, J., Lim, J., Terzis, A., Watt, A., Jeng, J., Chen, B., Lorincz, K.,Welsh,M.:Wireless medical sensor networks in emergency response: Implementation and pilot results. In: Proc. 2008 IEEE International Conference on Technologies for Homeland Security. IEEE, Los Alamitos (2008)
-
(2008)
Proc. 2008 IEEE International Conference on Technologies for Homeland Security
-
-
Gao, T.1
Pesto, C.2
Selavo, L.3
Chen, Y.4
Ko, J.5
Lim, J.6
Terzis, A.7
Watt, A.8
Jeng, J.9
Chen, B.10
Lorincz, K.11
Welsh, M.12
-
20
-
-
40549104107
-
The state of the art in critical infrastructure protection: A framework for convergence
-
Ghorbani, A.A., Bagheri, E.: The state of the art in critical infrastructure protection: a framework for convergence. International Journal of Critical Infrastructures 4, 215-244 (2008)
-
(2008)
International Journal of Critical Infrastructures
, vol.4
, pp. 215-244
-
-
Ghorbani, A.A.1
Bagheri, E.2
-
23
-
-
0003813045
-
-
Kluwer Academic Publishers, Norwell
-
Helal, A.A., Bhargava, B.K., Heddaya, A.A.: Replication Techniques in Distributed Systems. Kluwer Academic Publishers, Norwell (1996)
-
(1996)
Replication Techniques in Distributed Systems
-
-
Helal, A.A.1
Bhargava, B.K.2
Heddaya, A.A.3
-
24
-
-
70349346347
-
-
HIDENETS
-
HIDENETS. European FP6 project, http://www.hidenets.aau.dk/
-
European FP6 project
-
-
-
26
-
-
33745467053
-
Using the internet to communicate during a crisis
-
Jefferson, T.L.: Using the internet to communicate during a crisis. VINE 36, 139-142 (2006)
-
(2006)
VINE
, vol.36
, pp. 139-142
-
-
Jefferson, T.L.1
-
27
-
-
39449090815
-
A nature-inspired decentralized trust model to reduce information unreliability in complex disaster relief operations
-
Kostoulas, D., Aldunate, R., Pena-Mora, F., Lakhera, S.: A nature-inspired decentralized trust model to reduce information unreliability in complex disaster relief operations. Advanced Engineering Informatics 22(1), 45-58 (2008)
-
(2008)
Advanced Engineering Informatics
, vol.22
, Issue.1
, pp. 45-58
-
-
Kostoulas, D.1
Aldunate, R.2
Pena-Mora, F.3
Lakhera, S.4
-
28
-
-
85066851244
-
-
Krügel, C., Robertson, W.K.: Alert verification: Determining the success of intrusion attempts. In:Workshop the Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). German Informatics Society (2004)
-
Krügel, C., Robertson, W.K.: Alert verification: Determining the success of intrusion attempts. In:Workshop the Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA). German Informatics Society (2004)
-
-
-
-
30
-
-
0032597647
-
-
Labovitz, C., Ahuja, A., Jahanian, F.: Experimental study of internet stability and backbone failures. In: Twenty-Ninth Annual International Symposium on Digest of Papers Fault-Tolerant Computing (1999)
-
Labovitz, C., Ahuja, A., Jahanian, F.: Experimental study of internet stability and backbone failures. In: Twenty-Ninth Annual International Symposium on Digest of Papers Fault-Tolerant Computing (1999)
-
-
-
-
31
-
-
27644478879
-
Resilience characteristics of the internet backbone routing infrastructure
-
Labovitz, C., Wattenhofer, R., Venkatachary, S., Ahuja, A.: Resilience characteristics of the internet backbone routing infrastructure. In: Proc. Third Information SurvivabilityWorkshop (2000)
-
(2000)
Proc. Third Information SurvivabilityWorkshop
-
-
Labovitz, C.1
Wattenhofer, R.2
Venkatachary, S.3
Ahuja, A.4
-
32
-
-
38349013929
-
Modeling interdependencies between the electricity and information infrastructures
-
Saglietti, F, Oster, N, eds, SAFECOMP 2007, Springer, Heidelberg
-
Laprie, J., Kanoun, K., Kaniche, M.: Modeling interdependencies between the electricity and information infrastructures. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol. 4680, pp. 54-67. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4680
, pp. 54-67
-
-
Laprie, J.1
Kanoun, K.2
Kaniche, M.3
-
33
-
-
0034270431
-
Defending yourself: The role of intrusion detection systems
-
McHugh, J., Christie, A., Allen, J.: Defending yourself: the role of intrusion detection systems. IEEE Softw. 17(5), 42-51 (2000)
-
(2000)
IEEE Softw
, vol.17
, Issue.5
, pp. 42-51
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
34
-
-
8844238349
-
Project RESCUE: Challenges in responding to the unexpected
-
Santini, S, Schettini, R, eds, SPIE
-
Mehrotra, S., Butts, C.T., Kalashnikov, D., Venkatasubramanian, N., Rao, R.R., Chockalingam, G., Eguchi, R., Adams, B.J., Huyck, C.: Project RESCUE: challenges in responding to the unexpected. In: Santini, S., Schettini, R. (eds.) Internet Imaging V, vol. 5304, pp. 179-192. SPIE (2003)
-
(2003)
Internet Imaging V
, vol.5304
, pp. 179-192
-
-
Mehrotra, S.1
Butts, C.T.2
Kalashnikov, D.3
Venkatasubramanian, N.4
Rao, R.R.5
Chockalingam, G.6
Eguchi, R.7
Adams, B.J.8
Huyck, C.9
-
35
-
-
0036998995
-
Jtrs and the evolution toward software-defined radio
-
October, 2002
-
Melby, J.: Jtrs and the evolution toward software-defined radio. In: MILCOM 2002, October 2002, pp. 1286-1290 (2002)
-
(2002)
MILCOM 2002
, pp. 1286-1290
-
-
Melby, J.1
-
36
-
-
59349103612
-
Event-driven, role-based mobility in disaster recovery networks
-
ACM, New York
-
Nelson, S.C., Albert, I., Harris, F., Kravets, R.: Event-driven, role-based mobility in disaster recovery networks. In: Proc. second workshop on Challenged networks (CHANTS). ACM, New York (2007)
-
(2007)
Proc. second workshop on Challenged networks (CHANTS)
-
-
Nelson, S.C.1
Albert, I.2
Harris, F.3
Kravets, R.4
-
37
-
-
70349343341
-
A Dependable Architecture for Telemedicine in Support of Diaster Relief
-
Wiley, Chichester
-
Olariu, S., Maly, K., Foutriat, E.C., Yamany, S.M., Luckenbach, T.: A Dependable Architecture for Telemedicine in Support of Diaster Relief. In: Dependable Computing Systems, pp. 349-368. Wiley, Chichester (2005)
-
(2005)
Dependable Computing Systems
, pp. 349-368
-
-
Olariu, S.1
Maly, K.2
Foutriat, E.C.3
Yamany, S.M.4
Luckenbach, T.5
-
38
-
-
84905587265
-
Crosslayer overlay synchronization in sparse manets
-
Plagemann, T., Skjelsvik, K., Puzar, M., Drugan, O., Goebel, V., Munthe-Kaas, E.: Crosslayer overlay synchronization in sparse manets. In: Proc. 5th International ISCRAM Conference (2008)
-
(2008)
Proc. 5th International ISCRAM Conference
-
-
Plagemann, T.1
Skjelsvik, K.2
Puzar, M.3
Drugan, O.4
Goebel, V.5
Munthe-Kaas, E.6
-
40
-
-
0035696915
-
Identifying, understanding, and analyzing critical infrastructure interdependencies
-
Rinaldi, S., Peerenboom, J., Kelly, T.: Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst. Mag. 21(6), 11-25 (2001)
-
(2001)
IEEE Control Syst. Mag
, vol.21
, Issue.6
, pp. 11-25
-
-
Rinaldi, S.1
Peerenboom, J.2
Kelly, T.3
-
41
-
-
24344439365
-
Optimistic replication
-
Saito, Y., Shapiro, M.: Optimistic replication. ACM Comput. Surv. 37(1), 42-81 (2005)
-
(2005)
ACM Comput. Surv
, vol.37
, Issue.1
, pp. 42-81
-
-
Saito, Y.1
Shapiro, M.2
-
43
-
-
84905576039
-
-
Shank, N., Sokol, B., Hayes, M., Vetrano, C.: Human services data standards: Current progress and future visions in crisis response. In: Proc. ISCRAM conference (May 2008)
-
Shank, N., Sokol, B., Hayes, M., Vetrano, C.: Human services data standards: Current progress and future visions in crisis response. In: Proc. ISCRAM conference (May 2008)
-
-
-
-
44
-
-
0242527321
-
The shared wireless infostation model: A new ad hoc networking paradigm (or where there is a whale, there is a way)
-
MobiHoc, ACM, New York
-
Small, T., Haas, Z.J.: The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way). In: Proc. International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc). ACM, New York (2003)
-
(2003)
Proc. International Symposium on Mobile Ad Hoc Networking & Computing
-
-
Small, T.1
Haas, Z.J.2
-
45
-
-
84885775524
-
Spray and wait: An efficient routing scheme for intermittently connected mobile networks
-
ACM, New York
-
Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proc. SIGCOMM Workshop on Delaytolerant networking (WDTN). ACM, New York (2005)
-
(2005)
Proc. SIGCOMM Workshop on Delaytolerant networking (WDTN)
-
-
Spyropoulos, T.1
Psounis, K.2
Raghavendra, C.S.3
-
48
-
-
70349341748
-
Guide for developing security plans for federal information systems
-
Technical Report 800-18, National Institute of Standards and Technology February
-
Swanson, M., Hash, J., Bowen, P.: Guide for developing security plans for federal information systems. Technical Report 800-18, National Institute of Standards and Technology (February 2006)
-
(2006)
-
-
Swanson, M.1
Hash, J.2
Bowen, P.3
-
49
-
-
33749073702
-
Middleware support for fault tolerance
-
Mahmoud, Q, ed, John Wiley & Sons, Chichester
-
Szentivanyi, D., Nadjm-Tehrani, S.: Middleware support for fault tolerance. In: Mahmoud, Q. (ed.) Middleware for Communications. John Wiley & Sons, Chichester (2004)
-
(2004)
Middleware for Communications
-
-
Szentivanyi, D.1
Nadjm-Tehrani, S.2
-
50
-
-
12244286783
-
Lessons from experimental MANET research
-
Tschudin, C., Gunningberg, P., Lundgren, H., Nordström, E.: Lessons from experimental MANET research. Ad Hoc Networks 3(2), 221-233 (2005)
-
(2005)
Ad Hoc Networks
, vol.3
, Issue.2
, pp. 221-233
-
-
Tschudin, C.1
Gunningberg, P.2
Lundgren, H.3
Nordström, E.4
|