Sciweavers

936 search results - page 184 / 188
» Data Replication in Mariposa
Sort
View
ACSC
2004
IEEE
15 years 1 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
ASPLOS
2010
ACM
15 years 27 days ago
Orthrus: efficient software integrity protection on multi-cores
This paper proposes an efficient hardware/software system that significantly enhances software security through diversified replication on multi-cores. Recent studies show that a ...
Ruirui Huang, Daniel Y. Deng, G. Edward Suh
USENIX
2008
14 years 12 months ago
FlexVol: Flexible, Efficient File Volume Virtualization in WAFL
zation is a well-known method of abstracting physical resources and of separating the manipulation and use of logical resources from their underlying implementation. We have used ...
John K. Edwards, Daniel Ellard, Craig Everhart, Ro...
ATAL
2008
Springer
14 years 11 months ago
Modeling parallel and reactive empathy in virtual agents: an inductive approach
Humans continuously assess one another's situational context, modify their own affective state, and then respond based on these outcomes through empathetic expression. Virtua...
Scott W. McQuiggan, Jennifer L. Robison, Robert Ph...
AAAI
2010
14 years 11 months ago
User-Specific Learning for Recognizing a Singer's Intended Pitch
We consider the problem of automatic vocal melody transcription: translating an audio recording of a sung melody into a musical score. While previous work has focused on finding t...
Andrew Guillory, Sumit Basu, Dan Morris