Sciweavers

1183 search results - page 234 / 237
» Efficient Wet Paper Codes
Sort
View
FAST
2010
15 years 1 days ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
ELPUB
2008
ACM
14 years 11 months ago
No Budget, No Worries: Free and Open Source Publishing Software in Biomedical Publishing
Open Medicine (http://www.openmedicine.ca) is an electronic open access, peer-reviewed general medical journal that started publication in April 2007. The editors of Open Medicine...
Tarek Loubani, Sally Murray, Claire Kendall, Anita...
NSDI
2004
14 years 11 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...
USS
2004
14 years 11 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
AIPS
2009
14 years 10 months ago
Flexible Execution of Plans with Choice
Dynamic plan execution strategies allow an autonomous agent to respond to uncertainties while improving robustness and reducing the need for an overly conservative plan. Executive...
Patrick R. Conrad, Julie A. Shah, Brian C. William...