Sciweavers

698 search results - page 71 / 140
» Architecture Evaluation for Distributed Auto-ID Systems
Sort
View
HPCA
2006
IEEE
14 years 9 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
VLDB
2001
ACM
110views Database» more  VLDB 2001»
14 years 1 months ago
Comparing Hybrid Peer-to-Peer Systems
“Peer-to-peer” systems like Napster and Gnutella have recently become popular for sharing information. In this paper, we study the relevant issues and tradeoffs in designing a...
Beverly Yang, Hector Garcia-Molina
EUROMICRO
1997
IEEE
14 years 1 months ago
HPO: a programming environment for object-oriented metacomputing
Metacomputing is an emergent paradigm that makes possible to distribute applications over a heterogeneous set of computing systems to exploit all available resources. The paper pr...
Antonio Corradi, Letizia Leonardi, Franco Zambonel...
CLUSTER
2008
IEEE
14 years 3 months ago
Gather-arrange-scatter: Node-level request reordering for parallel file systems on multi-core clusters
—Multiple processors or multi-core CPUs are now in common, and the number of processes running concurrently is increasing in a cluster. Each process issues contiguous I/O request...
Kazuki Ohta, Hiroya Matsuba, Yutaka Ishikawa
IEEESCC
2008
IEEE
14 years 3 months ago
A Fault Tolerance Approach for Enterprise Applications
Service Oriented Architectures (SOAs) have emerged as a preferred solution to tackle the complexity of large-scale, complex, distributed, and heterogeneous systems. Key to success...
Vina Ermagan, Ingolf Krüger, Massimiliano Men...