Sciweavers

2407 search results - page 223 / 482
» Design considerations for network processor operating system...
Sort
View
DSN
2007
IEEE
15 years 8 months ago
Portable and Efficient Continuous Data Protection for Network File Servers
Continuous data protection, which logs every update to a file system, is an enabling technology to protect file systems against malicious attacks and/or user mistakes, because it ...
Ningning Zhu, Tzi-cker Chiueh
WISEC
2010
ACM
15 years 11 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
ICOIN
2007
Springer
15 years 10 months ago
Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution
Construction of overlay networks without any consideration of real network topologies causes inefficient routing in peer-to-peer networks. This paper presents the design and evalua...
Kunwoo Park, Sangheon Pack, Taekyoung Kwon
IDEAL
2003
Springer
15 years 9 months ago
A Multi-agent System for Emergency Decision Support
This paper describes the multi-agent organization of a computer system that was designed to assist operators in decision making in the presence of emergencies. The application was ...
Martín Molina, Gemma Blasco
149
Voted
ISSS
1999
IEEE
131views Hardware» more  ISSS 1999»
15 years 9 months ago
Compressed Code Execution on DSP Architectures
Decreasing the program size has become an important goal in the design of embedded systems target to mass production. This problem has led to a number of efforts aimed at designin...
Paulo Centoducatte, Ricardo Pannain, Guido Araujo