Sciweavers

147 search results - page 15 / 30
» Automatic recovery from software failure
Sort
View
EUROSYS
2006
ACM
13 years 11 months ago
Fireflies: scalable support for intrusion-tolerant network overlays
This paper describes and evaluates Fireflies, a scalable protocol for supporting intrusion-tolerant network overlays.1 While such a protocol cannot distinguish Byzantine nodes fro...
Håvard D. Johansen, André Allavena, R...
ALGORITHMICA
2000
76views more  ALGORITHMICA 2000»
13 years 7 months ago
Visibility-Based Planning of Sensor Control Strategies
Abstract. We consider the problem of planning sensor control strategies that enable a sensor to be automatically configured for robot tasks. In this paper we present robust and eff...
Amy J. Briggs, Bruce Randall Donald
IVC
2007
138views more  IVC 2007»
13 years 7 months ago
Silhouette lookup for monocular 3D pose tracking
Computers should be able to detect and track the articulated 3-D pose of a human being moving through a video sequence. Incremental tracking methods often prove slow and unreliabl...
Nicholas R. Howe
IUI
2010
ACM
14 years 2 months ago
From documents to tasks: deriving user tasks from document usage patterns
A typical knowledge worker is involved in multiple tasks and switches frequently between them every work day. These frequent switches become expensive because each task switch req...
Oliver Brdiczka
ASPLOS
1992
ACM
13 years 11 months ago
Parity Declustering for Continuous Operation in Redundant Disk Arrays
We describe and evaluate a strategy for declustering the parity encoding in a redundant disk array. This declustered parity organization balances cost against data reliability and...
Mark Holland, Garth A. Gibson