Sciweavers

14285 search results - page 2751 / 2857
» Web Based Management
Sort
View
PLDI
2010
ACM
16 years 1 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
ICWS
2009
IEEE
16 years 1 months ago
Scalable and Reliable Location Services through Decentralized Replication
—One of the critical challenges for service oriented computing systems is the capability to guarantee scalable and reliable service provision. This paper presents Reliable GeoGri...
Gong Zhang, Ling Liu, Sangeetha Seshadri, Bhuvan B...
EUROSYS
2006
ACM
16 years 1 months ago
On the road to recovery: restoring data after disasters
—Restoring data operations after a disaster is a daunting task: how should recovery be performed to minimize data loss and application downtime? Administrators are under consider...
Kimberly Keeton, Dirk Beyer 0002, Ernesto Brau, Ar...
SOSP
2003
ACM
16 years 1 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
SOSP
2005
ACM
16 years 1 months ago
FS2: dynamic data replication in free disk space for improving disk performance and energy consumption
Disk performance is increasingly limited by its head positioning latencies, i.e., seek time and rotational delay. To reduce the head positioning latencies, we propose a novel tech...
Hai Huang, Wanda Hung, Kang G. Shin
« Prev « First page 2751 / 2857 Last » Next »