Sciweavers

590 search results - page 95 / 118
» Continuous performance monitoring for large-scale parallel a...
Sort
View
SASO
2008
IEEE
15 years 6 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
ICDCS
2005
IEEE
15 years 5 months ago
Systems Support for Pervasive Query Processing
Database queries, in particular, event-driven continuous queries, are useful for many pervasive computing applications, such as video surveillance. In order to enable these applic...
Wenwei Xue, Qiong Luo, Lionel M. Ni
CLUSTER
2008
IEEE
14 years 12 months ago
Translating Service Level Objectives to lower level policies for multi-tier services
Service providers and their customers agree on certain quality of service guarantees through Service Level Agreements (SLA). An SLA contains one or more Service Level Objectives (S...
Yuan Chen, Subu Iyer, Xue Liu, Dejan S. Milojicic,...
96
Voted
VCIP
2003
163views Communications» more  VCIP 2003»
15 years 1 months ago
Comparing subjective video quality testing methodologies
International recommendations for subjective video quality assessment (e.g., ITU-R BT.500-11) include specifications for how to perform many different types of subjective tests. S...
Margaret H. Pinson, Stephen Wolf
ICPP
2009
IEEE
15 years 6 months ago
Run to Potential: Sweep Coverage in Wireless Sensor Networks
—Wireless sensor networks have become a promising technology in monitoring physical world. In many applications with wireless sensor networks, it is essential to understand how w...
Min Xi, Kui Wu, Yong Qi, Jizhong Zhao, Yunhao Liu,...