Sciweavers

1260 search results - page 128 / 252
» The Role of Models in Leveraging Information
Sort
View
SP
2007
IEEE
113views Security Privacy» more  SP 2007»
15 years 4 months ago
Usable Mandatory Integrity Protection for Operating Systems
Existing mandatory access control systems for operating systems are difficult to use. We identify several principles for designing usable access control systems and introduce the...
Ninghui Li, Ziqing Mao, Hong Chen
ICDCS
2006
IEEE
15 years 4 months ago
Application-Tailored Cache Consistency for Wide-Area File Systems
The inability to perform optimizations based on application-specific information presents a hurdle to the deployment of pervasive LAN file systems across WAN environments. This pa...
Ming Zhao 0002, Renato J. O. Figueiredo
IMC
2005
ACM
15 years 3 months ago
Exploiting Internet Route Sharing for Large Scale Available Bandwidth Estimation
Recent progress in active measurement techniques has made it possible to estimate end-to-end path available bandwidth. However, how to efficiently obtain available bandwidth info...
Ningning Hu, Peter Steenkiste
JEI
2006
109views more  JEI 2006»
14 years 10 months ago
Robotic three-dimensional imaging system for under-vehicle inspection
We present our research efforts toward the deployment of 3-D sensing technology to an under-vehicle inspection robot. The 3-D sensing modality provides flexibility with ambient lig...
Sreenivas R. Sukumar, David L. Page, Andrei V. Gri...
CLUSTER
1999
IEEE
14 years 9 months ago
Simulative performance analysis of gossip failure detection for scalable distributed systems
Three protocols for gossip-based failure detection services in large-scale heterogeneous clusters are analyzed and compared. The basic gossip protocol provides a means by which fai...
Mark W. Burns, Alan D. George, Bradley A. Wallace