Sciweavers

IFIP
2010
Springer
12 years 11 months ago
Bounded Memory Dolev-Yao Adversaries in Collaborative Systems
Abstract. This paper extends existing models for collaborative systems. We investigate how much damage can be done by insiders alone, without collusion with an outside adversary. I...
Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, ...
JCP
2006
93views more  JCP 2006»
13 years 4 months ago
Reliable Partial Replication of Contents in Web Clusters: Getting Storage without losing Reliability
Traditionally, distributed Web servers have used two strategies for allocating files on server nodes: full replication and full distribution. While full replication provides a high...
José Daniel García, Jesús Car...
MDM
2010
Springer
183views Communications» more  MDM 2010»
13 years 9 months ago
Dessy: Demonstrating Mobile Search and Synchronization
—The storage capacity of smartphones has reached tens of gigabytes, while the search functionality remains simple. We have designed a search and synchronization framework for mob...
Eemil Lagerspetz, Sasu Tarkoma, Tancred Lindholm
AC
2003
Springer
13 years 9 months ago
Naming and Integrity: Self-verifying Data in Peer-to-Peer Systems
Peer-to-peer systems are positioned to take advantage of gains in network bandwidth, storage capacity, and computational resources to provide long-term durable storage infrastruct...
Hakim Weatherspoon, Chris Wells, John Kubiatowicz
INFOCOM
2007
IEEE
13 years 11 months ago
EnviroStore: A Cooperative Storage System for Disconnected Operation in Sensor Networks
— This paper presents a new cooperative storage system for sensor networks geared for disconnected operation (where sensor nodes do not have a connected path to a basestation). T...
Liqian Luo, Chengdu Huang, Tarek F. Abdelzaher, Ja...
DATE
2008
IEEE
85views Hardware» more  DATE 2008»
13 years 11 months ago
Video Processing Requirements on SoC Infrastructures
Applications from the embedded consumer domain put challenging requirements on SoC infrastructures, i.e. interconnect and memory. Specifically, video applications demand large sto...
Pieter van der Wolf, Tomas Henriksson
ICPP
2009
IEEE
13 years 11 months ago
On Maximum Stability with Enhanced Scalability in High-Churn DHT Deployment
Abstract—When applied in a commercial deployment, DHTbased P2P protocols face a dilemma: although most real-world participants are so unstable that the maintenance overhead is pr...
Junfeng Xie, Zhenhua Li, Guihai Chen, Jie Wu
DAC
2005
ACM
14 years 5 months ago
Minimising buffer requirements of synchronous dataflow graphs with model checking
Signal processing and multimedia applications are often implemented on resource constrained embedded systems. It is therefore important to find implementations that use as little ...
Marc Geilen, Twan Basten, Sander Stuijk