Sciweavers

6560 search results - page 1180 / 1312
» The Human Context of Information Systems
Sort
View
CCS
2004
ACM
15 years 7 months ago
Comparing the expressive power of access control models
Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between di...
Mahesh V. Tripunitara, Ninghui Li
IPSN
2004
Springer
15 years 7 months ago
Estimation from lossy sensor data: jump linear modeling and Kalman filtering
Due to constraints in cost, power, and communication, losses often arise in large sensor networks. The sensor can be modeled as an output of a linear stochastic system with random...
Alyson K. Fletcher, Sundeep Rangan, Vivek K. Goyal
VEE
2010
ACM
238views Virtualization» more  VEE 2010»
15 years 7 months ago
Optimizing crash dump in virtualized environments
Crash dump, or core dump is the typical way to save memory image on system crash for future offline debugging and analysis. However, for typical server machines with likely abund...
Yijian Huang, Haibo Chen, Binyu Zang
SIGMETRICS
2010
ACM
208views Hardware» more  SIGMETRICS 2010»
15 years 6 months ago
Dynamics in congestion games
Game theoretic modeling and equilibrium analysis of congestion games have provided insights in the performance of Internet congestion control, road transportation networks, etc. D...
Devavrat Shah, Jinwoo Shin
SIGMETRICS
1999
ACM
120views Hardware» more  SIGMETRICS 1999»
15 years 6 months ago
A Performance Study of Dynamic Replication Techniques in Continuous Media Servers
Multimedia applications are emerging in education, information dissemination, entertainment, as well as many other applications. The stringent requirements of such applications ma...
Cheng-Fu Chou, Leana Golubchik, John C. S. Lui
« Prev « First page 1180 / 1312 Last » Next »