Revised reference model
暂无分享,去创建一个
Jean Arlat | Andrea Bondavalli | Nicolas Rivière | Matthieu Roy | Thibault Julien Renier | António Casimiro | Yaoda Liu | Lorenzo Falai | Mario Calha | Gábor Huszerl | András Kövi | Erling Vestergaard Matthiesen | Mohamed Kaâniche | Hélène Waeselynck | Alessandro Daidone | M-O. Killijian | Paolo Lolinni | M. Radimirsch | H-P. Schwefel | I-E. Svinnset | A. Casimiro | H. Schwefel | A. Bondavalli | J. Arlat | M. Kaâniche | Marc-Olivier Killijian | András Kövi | H. Waeselynck | Nicolas Rivière | Matthieu Roy | Alessandro Daidone | Lorenzo Falai | G. Huszerl | I. Svinnset | T. Renier | E. V. Matthiesen | Yaoda Liu | M. Radimirsch | M. Calha | Paolo Lolinni | M. Killijian
[1] John S. Sobolewski,et al. SideCar: building programmable datacenter networks without programmable switches , 2010, Hotnets-IX.
[2] Ieee . Wg. Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification , 2003 .
[3] Michael Schreckenberg,et al. A cellular automaton model for freeway traffic , 1992 .
[4] John Kubiatowicz,et al. Erasure Coding Vs. Replication: A Quantitative Comparison , 2002, IPTPS.
[5] Joseph Kee-Yin Ng,et al. Embedded program testing in untestable mobile environment: an experience of trustworthiness approach , 2004, 11th Asia-Pacific Software Engineering Conference.
[6] M. Omizo,et al. Modeling , 1983, Encyclopedic Dictionary of Archaeology.
[7] Axel Klar,et al. Mathematical Models for Vehicular Traffic , 1995 .
[8] Andrea Bondavalli,et al. Markov Regenerative Stochastic Petri Nets to Model and Evaluate Phased Mission Systems Dependability , 2001, IEEE Trans. Computers.
[9] Achim Autenrieth,et al. Fault Tolerance and Resilience Issues in IP-Based Networks , 2000 .
[10] Paulo Veríssimo,et al. Travelling through wormholes: a new look at distributed systems models , 2006, SIGA.
[11] Paulo Veríssimo,et al. Distributed Systems for System Architects , 2001, Advances in Distributed Computing and Middleware.
[12] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[13] John J. Barton,et al. UBIWISE, A Simulator for Ubiquitous Computing Systems Design , 2003 .
[14] Lester Lipsky,et al. On the necessity of transient performance analysis in telecommunication networks , 2001 .
[15] Xiao Chen,et al. Multicasting techniques in mobile ad hoc networks , 2003 .
[16] Karama Kanoun,et al. Stepwise construction and refinement of dependability models , 2002, Proceedings International Conference on Dependable Systems and Networks.
[17] Christine Julien,et al. Relying on safe distance to achieve strong partitionable group membership in ad hoc networks , 2004, IEEE Transactions on Mobile Computing.
[18] Andrea Bondavalli,et al. Experimental evaluation of the QoS of failure detectors on wide area network , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[19] Jie Wu. Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks , 2005 .
[20] Nigel Davies,et al. Evaluating a location-based application: a hybrid test and simulation environment , 2004, IEEE Pervasive Computing.
[21] D. M. Chiu,et al. Erasure code replication revisited , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..
[22] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[23] François Baccelli,et al. Stochastic geometry and architecture of communication networks , 1997, Telecommun. Syst..
[24] Yves Crouzet,et al. Software Statistical Testing , 1995 .
[25] AvizienisAlgirdas,et al. Basic Concepts and Taxonomy of Dependable and Secure Computing , 2004 .
[26] Nora Koch,et al. UML for Global Computing , 2003, Global Computing.
[27] Andrea Bondavalli,et al. Stochastic Dependability Analysis of System Architecture Based on UML Models , 2002, WADS.
[28] Sam Toueg,et al. Unreliable failure detectors for reliable distributed systems , 1996, JACM.
[29] Hrushikesha Mohanty,et al. MOBICHARTS: a notation to specify mobile computing applications , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[30] Jens Myrup Pedersen,et al. Report on resilient topologies and routing , 2006 .
[31] Antonio Casimiro,et al. The Timely Computing Base Model and Architecture , 2002, IEEE Trans. Computers.
[32] Michael Mitzenmacher,et al. Digital fountains: a survey and look forward , 2004, Information Theory Workshop.
[33] Lihao Xu,et al. Hydra: a platform for survivable and secure data storage systems , 2005, StorageSS '05.
[34] Yves Crouzet,et al. Benchmarking the dependability of Windows and Linux using PostMark/spl trade/ workloads , 2005, 16th IEEE International Symposium on Software Reliability Engineering (ISSRE'05).
[35] Robbert van Renesse,et al. Scalable Wireless Ad Hoc Network Simulation , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.
[36] Stephen S. Yau,et al. Testing context-sensitive middleware-based software applications , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..
[37] D. de Bruin,et al. Design and test of a cooperative adaptive cruise control system , 2004, IEEE Intelligent Vehicles Symposium, 2004.
[38] Peter Buchholz,et al. A Toolbox for Functional and Quantitative Analysis of DEDS , 1998, Computer Performance Evaluation.
[39] Tsong Yueh Chen,et al. A metamorphic approach to integration testing of context-sensitive middleware-based applications , 2005, Fifth International Conference on Quality Software (QSIC'05).
[40] N. Asokan,et al. Optimistic protocols for fair exchange , 1997, CCS '97.
[41] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[42] Ivan Stojmenovic,et al. Broadcasting and Topology Control in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.
[43] Hrushikesha Mohanty,et al. Specifying a Mobile Computing Infrastructure and Services , 2004, ICDCIT.
[44] Christoph Schroth,et al. Simulating the traffic effects of vehicle-to-vehicle messaging systems , 2005 .
[45] Ana R. Cavalli,et al. A validation model for the DSR protocol , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[46] Hans-Peter Schwefel,et al. QRP01-5: Quantitative Analysis of Access Strategies to Remote Information in Network Services , 2006, IEEE Globecom 2006.
[47] Sonia Heemstra de Groot,et al. Specification HIDENETS laboratory set-up scenario and components (Refined specification HIDENETS proof-of-concept set up): HIDENETS D6.2 , 2007 .
[48] Hans-Peter Schwefel,et al. Transient analysis of RED queues: A quantitative analysis of buffer-occupancy fluctuations and relevant time-scales , 2006, Perform. Evaluation.
[49] Jehoshua Bruck,et al. Low density MDS codes and factors of complete graphs , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[50] Gianni A. Di Caro,et al. Analysis of simulation environments for mobile ad hoc networks. , 2003 .
[51] David Thaler,et al. Link-local Multicast Name Resolution (LLMNR) , 2007, RFC.
[52] Vinny Cahill,et al. Towards group communication for mobile participants. , 2001 .
[53] Ivan Stojmenovic. Geocasting in Ad Hoc and Sensor Networks , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.
[54] António Casimiro,et al. Use case scenarios and preliminary reference model , 2007 .
[55] Kai Nagel,et al. Two-lane traffic rules for cellular automata: A systematic approach , 1997, cond-mat/9712196.
[56] Eranga Perera,et al. Survey on network mobility support , 2004, MOCO.
[57] Jeff Ahrenholz. OSPFv2 Wireless Interface Type , 2004 .
[58] C. Viho,et al. Modeling, verifying and testing the mobility management in the mobile IPv6 protocol , 2005, Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005..
[59] Nicolas Rivière,et al. Mobile Systems from a Validation Perspective: a Case Study , 2007, Sixth International Symposium on Parallel and Distributed Computing (ISPDC'07).
[60] William H. Sanders,et al. Model-based evaluation: from dependability to security , 2004, IEEE Transactions on Dependable and Secure Computing.
[61] Flaviu Cristian,et al. The Timed Asynchronous Distributed System Model , 1998, IEEE Trans. Parallel Distributed Syst..
[62] Charles E. Perkins,et al. IP Mobility Support for IPv4 , 2002, RFC.
[63] Ross W. Callon,et al. Use of OSI IS-IS for routing in TCP/IP and dual environments , 1990, RFC.
[64] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[65] K.K. Tam,et al. Session Initiation Protocol , 2002, 2002 IEEE International Conference on Industrial Technology, 2002. IEEE ICIT '02..
[66] Hermann Kopetz,et al. Dependability: Basic Concepts and Terminology , 1992 .
[67] Emmanuelle Anceaume,et al. On the Formal Specification of Group Membership Services , 1994 .
[68] Diego Latella,et al. Dependability analysis in the early phases of UML-based system design , 2001, Comput. Syst. Sci. Eng..
[69] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[70] John Moy,et al. OSPF Version 2 , 1998, RFC.
[71] H. Kopetz,et al. Dependability: Basic Concepts and Terminology , 1992, Dependable Computing and Fault-Tolerant Systems.
[72] Vincenzo Grassi,et al. A UML Profile to Model Mobile Systems , 2004, UML.
[73] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[74] George Coulouris,et al. A Generic Location Event Simulator , 2002, UbiComp.
[75] F. Baccelli,et al. Markov paths on the Poisson-Delaunay graph with applications to routeing in mobile networks , 2000, Advances in Applied Probability.
[76] Bernadette Charron-Bost,et al. On the impossibility of group membership , 1996, PODC '96.
[77] A. Avizienis,et al. Dependable computing: From concepts to design diversity , 1986, Proceedings of the IEEE.
[78] Randall R. Stewart,et al. Stream Control Transmission Protocol , 2000, RFC.
[79] Amin Vahdat,et al. Design and evaluation of a continuous consistency model for replicated services , 2000, OSDI.