Sciweavers

2863 search results - page 517 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
SAC
2009
ACM
15 years 9 months ago
ERIKA and open-ZB: an implementation for real-time wireless networking
IEEE 802.15.4/ZigBee and TinyOS have been playing an important role in leveraging a new generation of large-scale networked embedded systems. However, based on previous experience...
Paolo Pagano, Mangesh Chitnis, Antonio Romano, Giu...
IMC
2006
ACM
15 years 8 months ago
Understanding churn in peer-to-peer networks
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and evaluation. Accurately characterizing churn requir...
Daniel Stutzbach, Reza Rejaie
CN
2006
62views more  CN 2006»
15 years 2 months ago
Key bundles and parcels: Secure communication in many groups
We consider a system where each user is in one or more elementary groups. In this system, arbitrary groups of users can be specified using the operations of union, intersection, a...
Eunjin Jung, Alex X. Liu, Mohamed G. Gouda
124
Voted
ICS
2009
Tsinghua U.
15 years 9 months ago
/scratch as a cache: rethinking HPC center scratch storage
To sustain emerging data-intensive scientific applications, High Performance Computing (HPC) centers invest a notable fraction of their operating budget on a specialized fast sto...
Henry M. Monti, Ali Raza Butt, Sudharshan S. Vazhk...
166
Voted
RR
2010
Springer
15 years 25 days ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt