Sciweavers

15782 search results - page 307 / 3157
» Network Optimization and Control
Sort
View
CONEXT
2010
ACM
15 years 2 months ago
Personal data vaults: a locus of control for personal data streams
Min Mun, Shuai Hao, Nilesh Mishra, Katie Shilton, ...
CCGRID
2003
IEEE
15 years 9 months ago
Performability Evaluation of Networked Storage Systems Using N-SPEK
This paper introduces a new benchmark tool for evaluating performance and availability (performability) of networked storage systems, specifically storage area network (SAN) that...
Ming Zhang, Qing Yang, Xubin He
TMC
2008
179views more  TMC 2008»
15 years 4 months ago
Active Queue Management for Fair Resource Allocation in Wireless Networks
This paper investigates the interaction between end-to-end flow control and medium access control (MAC)-layer scheduling on wireless links. We consider a wireless network with mult...
Lachlan L. H. Andrew, Stephen V. Hanly, Rami G. Mu...
CCS
2009
ACM
16 years 4 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong