Sciweavers

3528 search results - page 591 / 706
» A New Approach to Planning in Networks
Sort
View
DSN
2008
IEEE
15 years 4 months ago
Analyzing the effects of disk-pointer corruption
The long-term availability of data stored in a file system depends on how well it safeguards on-disk pointers used to access the data. Ideally, a system would correct all pointer...
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin ...
ICMCS
2008
IEEE
194views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Sparse FEC codes for flexible media protection
In this paper, we study block codes that are optimized to recover some lost source data even in case when full recovery is not possible. Conventionally, block codes designed for p...
Jari Korhonen, Pascal Frossard
ICNSC
2008
IEEE
15 years 4 months ago
Towards a Decision Support Personalised Self Management System for Chronic Conditions
—People with long term health conditions often experience a radically reduced quality of life and suffer from a range of symptoms. Self management can encourage patients with a c...
Huiru Zheng, Chris D. Nugent, Paul J. McCullagh, N...
IDEAS
2008
IEEE
96views Database» more  IDEAS 2008»
15 years 4 months ago
Robust aggregation in peer-to-peer database systems
Peer-to-peer database systems (P2PDBs) aim at providing database services with node autonomy, high availability and loose coupling between participating nodes by building the DBMS...
Norvald H. Ryeng, Kjetil Nørvåg
INFOCOM
2008
IEEE
15 years 4 months ago
Detecting Anomalies Using End-to-End Path Measurements
—In this paper, we propose new “low-overhead” network monitoring techniques to detect violations of path-level QoS guarantees like end-to-end delay, loss, etc. Unlike existin...
K. V. M. Naidu, Debmalya Panigrahi, Rajeev Rastogi