Sciweavers

1156 search results - page 69 / 232
» The PENG System: Practice and Experience
Sort
View
MSS
1999
IEEE
125views Hardware» more  MSS 1999»
15 years 3 months ago
Configuring and Tuning Archival Storage Systems
Archival storage systems must operate under stringent requirements, providing 100% availability while guaranteeing that data will not be lost. In this paper we explore the multipl...
Reagan Moore, Joe Lopez, Charles Lofton, Wayne Sch...
SEE
1997
Springer
15 years 3 months ago
An environment for object-oriented real-time systems design
A concise object-oriented method for the development of real-time systems has been composed. Hardware components are modelled by (sofnuare) base objects; base objects are controll...
Rob L. W. van de Weg, Rolf Engmann, Raoul van de H...
EOR
2006
68views more  EOR 2006»
14 years 11 months ago
Evaluation of time-varying availability in multi-echelon spare parts systems with passivation
The popular models for repairable item inventory, both in the literature as well as practical applications, assume that the demands for items are independent of the number of work...
Hoong Chuin Lau, Huawei Song, Chuen Teck See, Siew...
JDCTA
2010
172views more  JDCTA 2010»
14 years 6 months ago
Performance Test of An Embedded Real-Time Operating System Based on A New High-Security NetWork Computer
Performance indexes of the embedded real-time operating system are not isolated but interacting with each other. Two sets of elements aiming to describe the relationship between t...
Gengxin Sun, Fengjing Shao Name, Sheng Bin
IH
2001
Springer
15 years 3 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn