Sciweavers

3168 search results - page 33 / 634
» Design, implementation and evaluation of a virtual storage s...
Sort
View
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 5 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
TPDS
2010
155views more  TPDS 2010»
14 years 10 months ago
Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation
—Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. However, all these s...
Jing Zhao, Ping Zhang, Guohong Cao, Chita R. Das
GIL
2009
14 years 9 months ago
A Software Package for Managing and Evaluating DNA Sequence and Microsatellite Data
Abstract: We have surveyed three molecular biology labs in Germany and Vietnam to evaluate practical problems in the management of molecular genetics data. These labs are generatin...
Truong Van Chi Cong, Zhivko Duchev, Eildert Groene...
ISCA
2008
IEEE
105views Hardware» more  ISCA 2008»
15 years 6 months ago
Intra-disk Parallelism: An Idea Whose Time Has Come
Server storage systems use a large number of disks to achieve high performance, thereby consuming a significant amount of power. In this paper, we propose to significantly reduc...
Sriram Sankar, Sudhanva Gurumurthi, Mircea R. Stan
IAT
2010
IEEE
14 years 9 months ago
Design and Evaluation of Explainable BDI Agents
It is widely acknowledged that providing explanations is an important capability of intelligent systems. Explanation capabilities are useful, for example, in scenario-based traini...
Maaike Harbers, Karel van den Bosch, John-Jules Ch...