Sciweavers

1239 search results - page 135 / 248
» Techniques for the Design of Java Operating Systems
Sort
View
153
Voted
CIDR
2007
177views Algorithms» more  CIDR 2007»
15 years 4 months ago
bdbms - A Database Management System for Biological Data
Biologists are increasingly using databases for storing and managing their data. Biological databases typically consist of a mixture of raw data, metadata, sequences, annotations,...
Mohamed Y. Eltabakh, Mourad Ouzzani, Walid G. Aref
116
Voted
TKDE
2008
105views more  TKDE 2008»
15 years 3 months ago
Evolutionary Optimization of File Assignment for a Large-Scale Video-on-Demand System
We present a genetic algorithm for tackling a file assignment problem for a large-scale video-on-demand system. The file assignment problem is to find the optimal replication and a...
Jun Guo, Yi Wang, Kit-Sang Tang, Sammy Chan, Eric ...
ATAL
2005
Springer
15 years 9 months ago
A decentralized bargaining protocol on dependent continuous multi-issue for approximate pareto optimal outcomes
Negotiation techniques have been demonstrated to be effective in solving complex multi-objective problems. When the optimization process operates on continuous variables, it can b...
Nicola Gatti, Francesco Amigoni
SIGSOFT
2010
ACM
15 years 1 months ago
Finding latent performance bugs in systems implementations
Robust distributed systems commonly employ high-level recovery mechanisms enabling the system to recover from a wide variety of problematic environmental conditions such as node f...
Charles Edwin Killian, Karthik Nagaraj, Salman Per...
135
Voted
IEEESP
2006
130views more  IEEESP 2006»
15 years 3 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...