Sciweavers

988 search results - page 133 / 198
» Cryptographic access control in a distributed file system
Sort
View
TOOLS
1997
IEEE
15 years 4 months ago
Propagator: A Family of Patterns
PROPAGATOR is a family of patterns for consistently updating objects in a dependency network. The propagator patterns are found in such diverse applications as MAKE, WWW, spreadsh...
Peter H. Feiler, Walter F. Tichy
SEMWEB
2004
Springer
15 years 5 months ago
SemanticOrganizer: A Customizable Semantic Repository for Distributed NASA Project Teams
SemanticOrganizer is a collaborative knowledge management system designed to support distributed NASA projects, including multidisciplinary teams of scientists, engineers, and acci...
Richard M. Keller, Daniel C. Berrios, Robert E. Ca...
ISLPED
2006
ACM
109views Hardware» more  ISLPED 2006»
15 years 5 months ago
Power reduction of multiple disks using dynamic cache resizing and speed control
This paper presents an energy-conservation method for multiple disks and their cache memory. Our method periodically resizes the cache memory and controls the rotation speeds unde...
Le Cai, Yung-Hsiang Lu
CDC
2009
IEEE
119views Control Systems» more  CDC 2009»
15 years 4 months ago
Resource sharing optimality in WiFi infrastructure networks
Abstract— In WiFi networks, mobile nodes compete for accessing a shared channel by means of a random access protocol called Distributed Coordination Function (DCF). Although this...
Laura Giarré, Giovanni Neglia, Ilenia Tinni...
P2P
2006
IEEE
130views Communications» more  P2P 2006»
15 years 5 months ago
The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough