Sciweavers

274 search results - page 17 / 55
» The Design, Implementation and Operation of an Email Pseudon...
Sort
View
EMSOFT
2009
Springer
15 years 4 months ago
Serving embedded content via web applications: model, design and experimentation
Embedded systems such as smart cards or sensors are now widespread, but are often closed systems, only accessed via dedicated terminals. A new trend consists in embedding Web serv...
Simon Duquennoy, Gilles Grimaud, Jean-Jacques Vand...
SIGMETRICS
2010
ACM
201views Hardware» more  SIGMETRICS 2010»
15 years 4 months ago
Transparent, lightweight application execution replay on commodity multiprocessor operating systems
We present S, the first system to provide transparent, lowoverhead application record-replay and the ability to go live from replayed execution. S i...
Oren Laadan, Nicolas Viennot, Jason Nieh
ANLP
1997
110views more  ANLP 1997»
15 years 1 months ago
Automating NL Appointment Scheduling with COSMA
Appointment scheduling is a problem faced daily by many individuals and organizations. Cooperating agent systems have been developed to partially automate this task. In order to e...
Stephan Busemann
FAST
2007
15 years 1 months ago
Strong Accountability for Network Storage
This paper presents the design, implementation, and evaluation of CATS, a network storage service with strong accountability properties. A CATS server annotates read and write res...
Aydan R. Yumerefendi, Jeffrey S. Chase
WETICE
2005
IEEE
15 years 5 months ago
Transparent Remote File Access in the Minimum Intrusion Grid
This paper describes the implementation of a thin user-level layer to be installed on Grid resources. The layer fits in the Minimum intrusion Grid design by imposing as few requi...
Rasmus Andersen, Brian Vinter