Sciweavers

7379 search results - page 1231 / 1476
» How Many Clusters
Sort
View
STORAGESS
2006
ACM
15 years 10 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
UIST
2006
ACM
15 years 10 months ago
Translating keyword commands into executable code
Modern applications provide interfaces for scripting, but many users do not know how to write script commands. However, many users are familiar with the idea of entering keywords ...
Greg Little, Robert C. Miller
VEE
2006
ACM
155views Virtualization» more  VEE 2006»
15 years 10 months ago
A feather-weight virtual machine for windows applications
Many fault-tolerant and intrusion-tolerant systems require the ability to execute unsafe programs in a realistic environment without leaving permanent damages. Virtual machine tec...
Yang Yu, Fanglu Guo, Susanta Nanda, Lap-Chung Lam,...
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
15 years 10 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
MOBICOM
2005
ACM
15 years 9 months ago
Capacity of multi-channel wireless networks: impact of number of channels and interfaces
— This paper studies how the capacity of a static multi-channel network scales as the number of nodes, n, increases. Gupta and Kumar have determined the capacity of single-channe...
Pradeep Kyasanur, Nitin H. Vaidya
« Prev « First page 1231 / 1476 Last » Next »