In petabyte-scale distributed file systems that decouple read and write from metadata operations, behavior of the metadata server cluster will be critical to overall system perfo...
Sage A. Weil, Kristal T. Pollack, Scott A. Brandt,...
: A two-layer adaptive wrapping technique is proposed in this paper to migrate legacy Energy Management System (EMS) modules into reusable components, and therefore transforming th...
Large-scale distributed systems, e.g., Grid or P2P networks, are targets for large-scale attacks. Unfortunately, few existing systems support propagation of alerts during the atta...
Michael Treaster, William Conner, Indranil Gupta, ...
—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accura...
High-level vision systems use object, scene or domain specific knowledge to interpret images. Unfortunately, this knowledge has to be acquired for every domain. This makes it diffi...