Sciweavers

307 search results - page 61 / 62
» A Network Access Control Mechanism Based on Behavior Profile...
Sort
View
EMSOFT
2006
Springer
13 years 11 months ago
An analysis framework for network-code programs
Distributed real-time systems require a predictable and verifiable mechanism to control the communication medium. Current real-time communication protocols are typically independe...
Madhukar Anand, Sebastian Fischmeister, Insup Lee
NCA
2003
IEEE
14 years 26 days ago
Web Proxy Cache Replacement: Do's, Don'ts, and Expectations
Numerous research efforts have produced a large number of algorithms and mechanisms for web proxy caches. In order to build powerful web proxies and understand their performance, ...
Peter Triantafillou, Ioannis Aekaterinidis
NSDI
2004
13 years 9 months ago
Designing a DHT for Low Latency and High Throughput
Designing a wide-area distributed hash table (DHT) that provides high-throughput and low-latency network storage is a challenge. Existing systems have explored a range of solution...
Frank Dabek, Jinyang Li, Emil Sit, James Robertson...
STORAGESS
2005
ACM
14 years 1 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
JOCN
2010
104views more  JOCN 2010»
13 years 6 months ago
Spatial Attention Evokes Similar Activation Patterns for Visual and Auditory Stimuli
■ Neuroimaging studies suggest that a fronto-parietal network is activated when we expect visual information to appear at a specific spatial location. Here we examined whether a...
David V. Smith, Ben Davis, Kathy Niu, Eric W. Heal...