Sciweavers

1134 search results - page 132 / 227
» Distributed Proving in Access-Control Systems
Sort
View
136
Voted
ACSAC
2007
IEEE
15 years 10 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
DATE
2006
IEEE
82views Hardware» more  DATE 2006»
15 years 9 months ago
Performance analysis of greedy shapers in real-time systems
— Traffic shaping is a well-known technique in the area of networking and is proven to reduce global buffer requirements and end-to-end delays in networked systems. Due to these...
Ernesto Wandeler, Alexander Maxiaguine, Lothar Thi...
147
Voted
ICNP
2009
IEEE
15 years 1 months ago
RASPberry: A Stable Reader Activation Scheduling Protocol in Multi-Reader RFID Systems
Abstract--Recent technological advances have motivated largescale deployment of RFID systems. RFID readers are often static and carefully deployed in a planned manner. However, the...
ShaoJie Tang, Jing Yuan, Xiang-Yang Li, Guihai Che...
105
Voted
WWW
2004
ACM
16 years 4 months ago
PipeCF: a scalable DHT-based collaborative filtering recommendation system
Collaborative Filtering (CF) technique has proved to be one of the most successful techniques in recommendation systems in recent years. However, traditional centralized CF system...
Bo Xie, Peng Han, Ruimin Shen
123
Voted
QEST
2007
IEEE
15 years 9 months ago
A Generic Mean Field Convergence Result for Systems of Interacting Objects
We consider a model for interacting objects, where the evolution of each object is given by a finite state Markov chain, whose transition matrix depends on the present and the pa...
Jean-Yves Le Boudec, David McDonald, Jochen Mundin...