International audienceMobile devices (e.g., laptops, PDAs, cell phones) are increasingly relied on but are used in contexts that put them at risk of physical damage, loss or theft. This paper discusses the dependability evaluation of a cooperative backup service for mobile devices. Participating devices leverage encounters with other devices to temporarily replicate critical data. Permanent backups are created when the participating devices are able to access the fixed infrastructure. Several data replication and scattering strategies are presented, including the use of erasure codes. A methodology to model and evaluate them using Petri nets and Markov chains is described. We demonstrate that our cooperative backup service decreases the pro...
Storage capacity, like computing power, follows its Moore's law and grows dramatically. Consequently...
Storage capacity, like computing power, follows its Moore's law and grows dramatically. Consequently...
In this paper, we present a middleware for dependable mobile systems and an experimentation platform...
International audienceMobile devices (e.g., laptops, PDAs, cell phones) are increasingly relied on b...
Mobile devices such as laptops, PDAs and cell phones are increasingly relied on but are used in cont...
Mobile devices such as laptops, PDAs and cell phones are increasingly relied on but are used in cont...
Mobile devices such as laptops, PDAs and cell phones are increasingly relied on but are used in cont...
Mobile devices such as laptops, PDAs and cell phones are increasingly relied on but are used in cont...
Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact li...
Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact li...
Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact li...
Mobile devices are increasingly relied on but are used in contexts that put them at risk of physical...
Mobile devices are increasingly relied on but are used in contexts that put them at risk of physical...
Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact li...
Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact li...
Storage capacity, like computing power, follows its Moore's law and grows dramatically. Consequently...
Storage capacity, like computing power, follows its Moore's law and grows dramatically. Consequently...
In this paper, we present a middleware for dependable mobile systems and an experimentation platform...
International audienceMobile devices (e.g., laptops, PDAs, cell phones) are increasingly relied on b...
Mobile devices such as laptops, PDAs and cell phones are increasingly relied on but are used in cont...
Mobile devices such as laptops, PDAs and cell phones are increasingly relied on but are used in cont...
Mobile devices such as laptops, PDAs and cell phones are increasingly relied on but are used in cont...
Mobile devices such as laptops, PDAs and cell phones are increasingly relied on but are used in cont...
Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact li...
Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact li...
Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact li...
Mobile devices are increasingly relied on but are used in contexts that put them at risk of physical...
Mobile devices are increasingly relied on but are used in contexts that put them at risk of physical...
Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact li...
Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact li...
Storage capacity, like computing power, follows its Moore's law and grows dramatically. Consequently...
Storage capacity, like computing power, follows its Moore's law and grows dramatically. Consequently...
In this paper, we present a middleware for dependable mobile systems and an experimentation platform...