Sciweavers

31 search results - page 4 / 7
» sigmetrics 2006
Sort
View
SIGMETRICS
2006
ACM
123views Hardware» more  SIGMETRICS 2006»
14 years 6 days ago
Exploiting redundancy to conserve energy in storage systems
This paper makes two main contributions. First, it introduces Diverted Accesses, a technique that leverages the redundancy in storage systems to conserve disk energy. Second, it e...
Eduardo Pinheiro, Ricardo Bianchini, Cezary Dubnic...
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
14 years 6 days ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
SIGMETRICS
2006
ACM
14 years 6 days ago
Fluid modeling of pollution proliferation in P2P networks
P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsu...
Rakesh Kumar, David D. Yao, Amitabha Bagchi, Keith...
SIGMETRICS
2006
ACM
168views Hardware» more  SIGMETRICS 2006»
14 years 6 days ago
Throughput performance of popular JMS servers
The Java Messaging Service (JMS) facilitates communication among distributed software components according to the publish/subscribe principle. If the subscribers install filter r...
Michael Menth, Robert Henjes, Christian Zepfel, Se...
SIGMETRICS
2006
ACM
128views Hardware» more  SIGMETRICS 2006»
14 years 6 days ago
Partially overlapped channels not considered harmful
Many wireless channels in different technologies are known to have partial overlap. However, due to the interference effects among such partially overlapped channels, their simult...
Arunesh Mishra, Vivek Shrivastava, Suman Banerjee,...