Sciweavers

2752 search results - page 410 / 551
» Application performance in the QLinux multimedia operating s...
Sort
View
83
Voted
RAID
1999
Springer
15 years 3 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
EUROSYS
2007
ACM
15 years 8 months ago
Antiquity: exploiting a secure log for wide-area distributed storage
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all serve...
Hakim Weatherspoon, Patrick R. Eaton, Byung-Gon Ch...
GLVLSI
2008
IEEE
140views VLSI» more  GLVLSI 2008»
15 years 5 months ago
A table-based method for single-pass cache optimization
Due to the large contribution of the memory subsystem to total system power, the memory subsystem is highly amenable to customization for reduced power/energy and/or improved perf...
Pablo Viana, Ann Gordon-Ross, Edna Barros, Frank V...
128
Voted
NOSSDAV
2005
Springer
15 years 4 months ago
1-800-OVERLAYS: using overlay networks to improve VoIP quality
The cost savings and novel features associated with Voice over IP (VoIP) are driving its adoption by service providers. Such a transition however can successfully happen only if t...
Yair Amir, Claudiu Danilov, Stuart Goose, David He...
96
Voted
CBSE
2010
Springer
15 years 3 months ago
A Three-Tier Approach for Composition of Real-Time Embedded Software Stacks
Abstract. Many component models and frameworks have been proabstract and capture concerns from Real-Time and Embedded application domains, based on high-level component-based appro...
Frédéric Loiret, Lionel Seinturier, ...