Sciweavers

5866 search results - page 936 / 1174
» Designing Accelerator-Based Distributed Systems for High Per...
Sort
View
FAST
2009
15 years 1 months ago
Enabling Transactional File Access via Lightweight Kernel Extensions
Transactions offer a powerful data-access method used in many databases today trough a specialized query API. User applications, however, use a different fileaccess API (POSIX) wh...
Richard P. Spillane, Sachin Gaikwad, Manjunath Chi...
ICPADS
2005
IEEE
15 years 9 months ago
An Adaptive Multiparty Protocol for Secure Data Protection
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui T...
ATAL
2010
Springer
15 years 5 months ago
Assignment problem in requirements driven agent collaboration and its implementation
Requirements Driven Agent Collaboration (RDAC) is a mechanism where the self-interested service agents actively and autonomously search for the required services submitted by the ...
Jian Tang, Zhi Jin
JCDL
2005
ACM
175views Education» more  JCDL 2005»
15 years 9 months ago
Automated text classification using a multi-agent framework
Automatic text classification is an important operational problem in digital library practice. Most text classification efforts so far concentrated on developing centralized solut...
Yueyu Fu, Weimao Ke, Javed Mostafa
123
Voted
CORR
2002
Springer
93views Education» more  CORR 2002»
15 years 3 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker