Sciweavers

11573 search results - page 2229 / 2315
» Designing Relational Databases
Sort
View
DSN
2005
IEEE
15 years 8 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
HPDC
2005
IEEE
15 years 8 months ago
Collective caching: application-aware client-side file caching
Parallel file subsystems in today’s high-performance computers adopt many I/O optimization strategies that were designed for distributed systems. These strategies, for instance...
Wei-keng Liao, Kenin Coloma, Alok N. Choudhary, Le...
ICAC
2005
IEEE
15 years 8 months ago
Towards Autonomic Virtual Applications in the In-VIGO System
Grid environments enable users to share non-dedicated resources that lack performance guarantees. This paper describes the design of application-centric middleware components to a...
Jing Xu, Sumalatha Adabala, José A. B. Fort...
ICRA
2005
IEEE
130views Robotics» more  ICRA 2005»
15 years 8 months ago
Modeling and Control of Active End Effector for the AFM Based Nano Robotic Manipulators
Abstract— Nanomanipulation using Atomic Force Microscope (AFM) has been extensively investigated for many years. However, control of tip position during nanomanipulation is still...
Jiangbo Zhang, Guangyong Li, Ning Xi
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
15 years 8 months ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold
« Prev « First page 2229 / 2315 Last » Next »