Sciweavers

1530 search results - page 179 / 306
» Design and Implementation of a Key-Lifecycle Management Syst...
Sort
View
162
Voted
GPCE
2009
Springer
15 years 8 months ago
A generative programming approach to developing pervasive computing systems
Developing pervasive computing applications is a difficult task because it requires to deal with a wide range of issues: heterogeneous devices, entity distribution, entity coordi...
Damien Cassou, Benjamin Bertran, Nicolas Loriant, ...
176
Voted
ICS
2005
Tsinghua U.
15 years 9 months ago
Continuous Replica Placement schemes in distributed systems
The Replica Placement Problem (RPP) aims at creating a set of duplicated data objects across the nodes of a distributed system in order to optimize certain criteria. Typically, RP...
Thanasis Loukopoulos, Petros Lampsas, Ishfaq Ahmad
EUROMICRO
2004
IEEE
15 years 7 months ago
CoBFIT: A Component-Based Framework for Intrusion Tolerance
In this paper, we present the architecture of CoBFIT, a component-based framework for building intrusion-tolerant distributed systems. The CoBFIT framework, by virtue of its desig...
HariGovind V. Ramasamy, Adnan Agbaria, William H. ...
168
Voted
MMDB
2003
ACM
178views Multimedia» more  MMDB 2003»
15 years 8 months ago
Video query processing in the VDBMS testbed for video database research
The increased use of video data sets for multimedia-based applications has created a demand for strong video database support, including efficient methods for handling the content...
Walid G. Aref, Moustafa A. Hammad, Ann Christine C...
199
Voted
SIGMOD
2007
ACM
134views Database» more  SIGMOD 2007»
16 years 3 months ago
Updating a cracked database
A cracked database is a datastore continuously reorganized based on operations being executed. For each query, the data of interest is physically reclustered to speed-up future ac...
Stratos Idreos, Martin L. Kersten, Stefan Manegold