Sciweavers

274 search results - page 8 / 55
» The Design, Implementation and Operation of an Email Pseudon...
Sort
View
EDCC
2006
Springer
15 years 3 months ago
Construction of a Highly Dependable Operating System
It has been well established that most operating system crashes are due to bugs in device drivers. Because drivers are normally linked into the kernel address space, a buggy drive...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...
MM
2004
ACM
147views Multimedia» more  MM 2004»
15 years 5 months ago
Implementation and evaluation of EXT3NS multimedia file system
The EXT3NS is a scalable file system designed to handle video streaming workload in large-scale on-demand streaming services. It is based on a special H/W device, called Network-S...
Baik-Song Ahn, Sung-Hoon Sohn, Chei-Yol Kim, Gyu-I...
EMSOFT
2007
Springer
15 years 5 months ago
Design and implementation of a comprehensive real-time java virtual machine
The emergence of standards for programming real-time systems in Java has encouraged many developers to consider its use for systems previously only built using C, Ada, or assembly...
Joshua S. Auerbach, David F. Bacon, Bob Blainey, P...
80
Voted
DSN
2007
IEEE
15 years 3 months ago
Portable and Efficient Continuous Data Protection for Network File Servers
Continuous data protection, which logs every update to a file system, is an enabling technology to protect file systems against malicious attacks and/or user mistakes, because it ...
Ningning Zhu, Tzi-cker Chiueh
VLDB
1998
ACM
121views Database» more  VLDB 1998»
15 years 3 months ago
Hash Joins and Hash Teams in Microsoft SQL Server
The query execution engine in Microsoft SQL Server employs hash-based algorithms for inner and outer joins, semi-joins, set operations (such as intersection), grouping, and duplic...
Goetz Graefe, Ross Bunker, Shaun Cooper