Sciweavers

6894 search results - page 1347 / 1379
» On network interference management
Sort
View
STORAGESS
2005
ACM
15 years 5 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
ATAL
2005
Springer
15 years 5 months ago
A comparative evaluation of agent location mechanisms in large scale MAS
Agents in open multi-agent systems (MAS) need means for locating other agents with which they may collaborate. To address this need, several agent location mechanisms were suggest...
David Ben-Ami, Onn Shehory
DIGRA
2005
Springer
15 years 5 months ago
Framing Virtual Law
Building on the work of games theorists and virtual world designers, this paper proposes a framework for understanding the real-virtual dichotomy in terms of a series of five fram...
Peter Edelmann
DRM
2005
Springer
15 years 5 months ago
DRM interoperability analysis from the perspective of a layered framework
Interoperability is currently seen as one of the most significant problems facing the digital rights management (DRM) industry. In this paper we consider the problem of interoper...
Gregory L. Heileman, Pramod A. Jamkhedkar
ICS
2005
Tsinghua U.
15 years 5 months ago
High performance support of parallel virtual file system (PVFS2) over Quadrics
Parallel I/O needs to keep pace with the demand of high performance computing applications on systems with ever-increasing speed. Exploiting high-end interconnect technologies to ...
Weikuan Yu, Shuang Liang, Dhabaleswar K. Panda
« Prev « First page 1347 / 1379 Last » Next »