Sciweavers

13180 search results - page 2337 / 2636
» Network Models
Sort
View
ICEGOV
2007
ACM
15 years 8 months ago
Formal threat descriptions for enhancing governmental risk assessment
Compared to the last decades, we have recently seen more and more governmental applications which are provided via the Internet directly to the citizens. Due to the long history o...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer, Ed...
ATMOS
2008
103views Optimization» more  ATMOS 2008»
15 years 6 months ago
IP-based Techniques for Delay Management with Priority Decisions
Delay management is an important issue in the daily operations of any railway company. The task is to update the planned timetable to a disposition timetable in such a way that the...
Michael Schachtebeck, Anita Schöbel
IADIS
2004
15 years 5 months ago
A Scalable I/O Architecture and File System for Internet Servers
Most Internet services rely on the traditional client-server model, where the quality of services usually depends on the performance of those servers. In this paper, we propose a ...
Chei-Yol Kim, Sung-Hoon Sohn, Baik-Song Ahn, Gyu-I...
137
Voted
NSDI
2004
15 years 5 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...
138
Voted
NSDI
2004
15 years 5 months ago
Consistent and Automatic Replica Regeneration
Reducing management costs and improving the availability of large-scale distributed systems require automatic replica regeneration, i.e., creating new replicas in response to repl...
Haifeng Yu, Amin Vahdat
« Prev « First page 2337 / 2636 Last » Next »