Sciweavers

1448 search results - page 215 / 290
» Deadlock Detection in Distributed Systems
Sort
View
FGCS
2008
102views more  FGCS 2008»
15 years 5 months ago
Making the best of a bad situation: Prioritized storage management in GEMS
As distributed storage systems grow, the response time between detection and repair of the error becomes significant. Systems built on shared servers have additional complexity be...
Justin M. Wozniak, Paul Brenner, Douglas Thain, Aa...
166
Voted
JSAC
2006
137views more  JSAC 2006»
15 years 4 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
TMI
2008
88views more  TMI 2008»
15 years 4 months ago
Adaptive SPECT
Abstract--Adaptive imaging systems alter their dataacquisition configuration or protocol in response to the image information received. An adaptive pinhole SPECT system might acqui...
Harrison H. Barrett, L. R. Furenlid, M. Freed, J. ...
TPDS
2010
113views more  TPDS 2010»
14 years 11 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...
132
Voted
HPCC
2009
Springer
15 years 8 months ago
Dynamically Filtering Thread-Local Variables in Lazy-Lazy Hardware Transactional Memory
Abstract--Transactional Memory (TM) is an emerging technology which promises to make parallel programming easier. However, to be efficient, underlying TM system should protect only...
Sutirtha Sanyal, Sourav Roy, Adrián Cristal...