Sciweavers

1906 search results - page 162 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
135
Voted
IADIS
2003
15 years 5 months ago
Towards a Distributed Information Architecture for Avionics Data
Avionics data at the National Aeronautics and Space Administration’s (NASA) Jet Propulsion Laboratory (JPL) consists of distributed, unmanaged, and heterogeneous information tha...
Chris Mattmann, Dana Freeborn, Daniel J. Crichton
144
Voted
SOSP
2003
ACM
16 years 17 days ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
163
Voted
ICDCS
1995
IEEE
15 years 7 months ago
Analysis of Resource Lower Bounds in Real-Time Applications
Tasks in a real-time application usually have several stringent timing, resource, and communication requirements. Designing a distributed computing system which can meet all these...
Raed Alqadi, Parameswaran Ramanathan
138
Voted
CSREASAM
2006
15 years 5 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
109
Voted
ICPPW
2002
IEEE
15 years 8 months ago
Experiments with Parallelizing a Tribology Application
Different parallelization methods vary in their system requirements, programming styles, efficiency of exploring parallelism, and the application characteristics they can handle....
Vipin Chaudhary, W. L. Hase, Hai Jiang, L. Sun, Da...