Sciweavers

1583 search results - page 102 / 317
» The Quorum Deployment Problem
Sort
View
ICDE
2007
IEEE
142views Database» more  ICDE 2007»
15 years 9 months ago
Database Virtualization: A New Frontier for Database Tuning and Physical Design
Resource virtualization is currently being employed at all levels of the IT infrastructure to improve provisioning and manageability, with the goal of reducing total cost of owner...
Ahmed A. Soror, Ashraf Aboulnaga, Kenneth Salem
BIRTHDAY
2007
Springer
15 years 9 months ago
Models and Software Model Checking of a Distributed File Replication System
With the Distributed File System Replication component, DFS-R, as the central theme, we present selected protocol problems and validation methods encountered during design and deve...
Nikolaj Bjørner
WADS
2007
Springer
96views Algorithms» more  WADS 2007»
15 years 9 months ago
Initializing Sensor Networks of Non-uniform Density in the Weak Sensor Model
Abstract. Assumptions about node density in the Sensor Networks literature are frequently too strong or too weak. Neither absolutely arbitrary nor uniform deployment seem feasible ...
Martin Farach-Colton, Miguel A. Mosteiro
GLOBECOM
2006
IEEE
15 years 9 months ago
On the Optimal Scheduling for Media Streaming in Data-driven Overlay Networks
—The Internet has witnessed a rapid growth in deployment of data-driven overlay network (DON) based streaming applications during recent years. In these applications, each nodes ...
Meng Zhang, Yongqiang Xiong, Qian Zhang, Shiqiang ...
ICAIL
2007
ACM
15 years 7 months ago
How to capture, model, and verify the knowledge of legal, security, and privacy experts: a pattern-based approach
Laws set requirements that force organizations to assess the security and privacy of their IT systems and impose the adoption of the implementation of minimal precautionary securi...
Luca Compagna, Paul El Khoury, Fabio Massacci, Res...