Sciweavers

2237 search results - page 248 / 448
» Storing information with extractors
Sort
View
98
Voted
DATE
2010
IEEE
122views Hardware» more  DATE 2010»
15 years 6 months ago
SimTag: Exploiting tag bits similarity to improve the reliability of the data caches
— Though tag bits in the data caches are vulnerable to transient errors, few effort has been made to reduce their vulnerability. In this paper, we propose to exploit prevalent sa...
Jesung Kim, Soontae Kim, Yebin Lee
102
Voted
COOPIS
2002
IEEE
15 years 5 months ago
Parallel Processing with Autonomous Databases in a Cluster System
Abstract. We consider the use of a cluster system for Application Service Provider (ASP). In the ASP context, hosted applications and databases can be update-intensive and must rem...
Stéphane Gançarski, Hubert Naacke, E...
107
Voted
LCN
2002
IEEE
15 years 5 months ago
A New Location Management Strategy Based on User Mobility Pattern for Wireless Networks
For a wireless network to effectively deliver services to the mobile users, it must have an efficient way to track them. The location management fulfills this task through locat...
Wenchao Ma, Yuguang Fang
NOMS
2002
IEEE
112views Communications» more  NOMS 2002»
15 years 5 months ago
Paradigms for mobile agent based active monitoring of network systems
We present here a framework together with a set of paradigms for mobile agent based active monitoring of network systems. In our framework mobile agents are used to perform remote...
Anand Tripathi, Tanvir Ahmed, Sumedh Pathak, Megan...
NOMS
2002
IEEE
131views Communications» more  NOMS 2002»
15 years 5 months ago
Tools for domain-based policy management of distributed systems
The management of policies in large-scale systems is complex because of the potentially large number of policies and administrators, as well as the diverse types of information th...
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Mor...