Sciweavers

339 search results - page 53 / 68
» Using Utility to Provision Storage Systems
Sort
View
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
15 years 1 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont
CONCURRENCY
2004
77views more  CONCURRENCY 2004»
14 years 10 months ago
Grids of agents for computer and telecommunication network management
The centralized system approach for computer and telecommunication network management has been presenting scalability problems along with the growth in the number and diversity of...
Marcos Dias de Assunção, Fernando Lu...
INFOCOM
2011
IEEE
14 years 1 months ago
Resource management for fading wireless channels with energy harvesting nodes
—Wireless systems comprised of rechargeable nodes have a significantly prolonged lifetime and are sustainable. A distinct characteristic of these systems is the fact that the no...
Omur Ozel, Kaya Tutuncuoglu, Jing Yang, Sennur Ulu...
90
Voted
USENIX
2008
15 years 14 days ago
Idle Read After Write - IRAW
Despite a low occurrence rate, silent data corruption represents a growing concern for storage systems designers. Throughout the storage hierarchy, from the file system down to th...
Alma Riska, Erik Riedel
WWW
2007
ACM
15 years 10 months ago
Parallel crawling for online social networks
Given a huge online social network, how do we retrieve information from it through crawling? Even better, how do we improve the crawling performance by using parallel crawlers tha...
Duen Horng Chau, Shashank Pandit, Samuel Wang, Chr...