Sciweavers

1109 search results - page 137 / 222
» Decentralized access control in distributed file systems
Sort
View
IRI
2005
IEEE
15 years 7 months ago
Data-knowledge-context: an application model for collaborative work
For many years, researchers and software developers have been seeking to develop systems and applications to enable efficient and effective group work and organizational memory. ...
Lee A. Iverson
131
Voted
STORAGESS
2005
ACM
15 years 7 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
124
Voted
IEEEPACT
1999
IEEE
15 years 6 months ago
Memory System Support for Image Processing
Image processing applications tend to access their data non-sequentially and reuse that data infrequently. As a result, they tend to perform poorly on conventional memory systems ...
Lixin Zhang, John B. Carter, Wilson C. Hsieh, Sall...
CORR
2011
Springer
177views Education» more  CORR 2011»
14 years 5 months ago
Downlink SDMA with Limited Feedback in Interference-Limited Wireless Networks
The tremendous capacity gains promised by space division multiple access (SDMA) depend critically on the accuracy of the transmit channel state information. In the broadcast chann...
Marios Kountouris, Jeffrey G. Andrews
MSS
1999
IEEE
121views Hardware» more  MSS 1999»
15 years 6 months ago
Device Locks: Mutual Exclusion for Storage Area Networks
Device Locks are mechanisms used in distributed environments to facilitate mutual exclusion of shared resources. They can further be used to maintain coherence of data that is cac...
Kenneth W. Preslan, Steven R. Soltis, Christopher ...