Sciweavers

1568 search results - page 273 / 314
» Requirements and Services for Metadata Management
Sort
View
OSDI
2004
ACM
15 years 11 months ago
ksniffer: Determining the Remote Client Perceived Response Time from Live Packet Streams
As dependence on the World Wide Web continues to grow, so does the need for businesses to have quantitative measures of the client perceived response times of their Web services. ...
David P. Olshefski, Jason Nieh, Erich M. Nahum
MOBISYS
2007
ACM
15 years 10 months ago
Surface street traffic estimation
In this paper, we propose a simple yet effective method of identifying traffic conditions on surface streets given location traces collected from on-road vehicles--this requires o...
Jungkeun Yoon, Brian Noble, Mingyan Liu
SOSP
2003
ACM
15 years 8 months ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz
ESORICS
2009
Springer
15 years 5 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
ICC
2009
IEEE
111views Communications» more  ICC 2009»
15 years 5 months ago
Supporting VCR-Like Operations in Derivative Tree-Based P2P Streaming Systems
— Supporting user interactivity in peer-to-peer streaming systems is challenging. VCR-like operations, such as random seek, pause, fast forward and rewind, require timely P2P ove...
Tianyin Xu, Jianzhong Chen, Wenzhong Li, Sanglu Lu...