Sciweavers

1222 search results - page 78 / 245
» Verifying a File System Implementation
Sort
View
JSW
2007
124views more  JSW 2007»
15 years 2 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
98
Voted
PTS
2004
86views Hardware» more  PTS 2004»
15 years 3 months ago
From Safety Verification to Safety Testing
A methodology that combines verification and conformance testing for validating safety requirements of reactive systems is presented. The requirements are first automatically verif...
Vlad Rusu, Hervé Marchand, Valéry Ts...
77
Voted
CLUSTER
2002
IEEE
15 years 7 months ago
Noncontiguous I/O through PVFS
With the tremendous advances in processor and memory technology, I/O has risen to become the bottleneck in high-performance computing for many applications. The development of par...
Avery Ching, Alok N. Choudhary, Wei-keng Liao, Rob...
IWCC
1999
IEEE
15 years 6 months ago
Single I/O Space for Scalable Cluster Computing
In this paper, we propose a novel Single I/O Space architecture for achieving a Single System Image (SSI) at the I/O subsystem level. This is very much desired in a scalable clust...
Roy S. C. Ho, Hai Jin, Kai Hwang
ESORICS
2008
Springer
15 years 4 months ago
Remote Integrity Check with Dishonest Storage Server
We are interested in this problem: a verifier, with a small and reliable storage, wants to periodically check whether a remote server is keeping a large file x. A dishonest server,...
Ee-Chien Chang, Jia Xu