Sciweavers

2587 search results - page 468 / 518
» Intrusion Tolerant Systems
Sort
View
HPDC
2010
IEEE
15 years 29 days ago
ROARS: a scalable repository for data intensive scientific computing
As scientific research becomes more data intensive, there is an increasing need for scalable, reliable, and high performance storage systems. Such data repositories must provide b...
Hoang Bui, Peter Bui, Patrick J. Flynn, Douglas Th...
MOBICOM
2010
ACM
15 years 2 days ago
Did you see Bob?: human localization using mobile phones
Finding a person in a public place, such as in a library, conference hotel, or shopping mall, can be difficult. The difficulty arises from not knowing where the person may be at t...
Ionut Constandache, Xuan Bao, Martin Azizyan, Romi...
PODC
2010
ACM
15 years 2 days ago
The k-bakery: local-spin k-exclusion using non-atomic reads and writes
Mutual exclusion is used to coordinate access to shared resources by concurrent processes. k-Exclusion is a variant of mutual exclusion in which up to k processes can simultaneous...
Robert Danek
SIGCOMM
2010
ACM
15 years 2 days ago
Stratus: energy-efficient mobile communication using cloud support
Cellular radio communication is a significant contributor to battery energy drain on smartphones, in some cases inflating the energy cost by a factor of 5 or more compared to the ...
Bhavish Agarwal, Pushkar Chitnis, Amit Dey, Kamal ...
HPDC
2010
IEEE
15 years 2 days ago
Toward high performance computing in unconventional computing environments
Parallel computing on volatile distributed resources requires schedulers that consider job and resource characteristics. We study unconventional computing environments containing ...
Brent Rood, Nathan Gnanasambandam, Michael J. Lewi...