Sciweavers

1222 search results - page 102 / 245
» Verifying a File System Implementation
Sort
View
ATAL
2009
Springer
15 years 7 months ago
Adding incentives to file-sharing systems
Modern peer-to-peer file sharing systems rely heavily on the willingness of users to distribute files to others. A selfish user can choose to download a file and consume resou...
Aviv Zohar, Jeffrey S. Rosenschein
138
Voted
FCCM
2005
IEEE
115views VLSI» more  FCCM 2005»
15 years 8 months ago
FIFO Communication Models in Operating Systems for Reconfigurable Computing
Increasing demands upon embedded systems for higher level services like networking, user interfaces and file system management, are driving growth in fully-featured operating syst...
John A. Williams, Neil W. Bergmann, X. Xie
165
Voted
WIS
2004
15 years 4 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
99
Voted
ECRTS
1999
IEEE
15 years 7 months ago
Distributed real-time task monitoring in the safety-critical system Melody
Safety-critical systems typically operate in unpredictable environments. Requirements for safety and reliability are in conflict with those for real-time responsiveness. Due to un...
Horst F. Wedde, Jon A. Lind, Guido Seghert
133
Voted
IKE
2007
15 years 4 months ago
Bringing Information Retrieval Back To Database Management Systems
Information retrieval emerged as independent research area from traditional database management system more than a decade ago. This was driven by the increasing functional require...
Khaled Nagi