Sciweavers

5220 search results - page 129 / 1044
» Changing Persistent Applications
Sort
View
COLCOM
2005
IEEE
15 years 10 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
AMR
2005
Springer
88views Multimedia» more  AMR 2005»
15 years 10 months ago
Context-Based Image Similarity Queries
Abstract. In this paper an effective context-based approach for interactive similarity queries is presented. By exploiting the notion of image “context”, it is possible to asso...
Ilaria Bartolini
INFOCOM
2003
IEEE
15 years 9 months ago
Analysis of Routing Characteristics in the Multicast Infrastructure
Abstract— As the multicast-capable part of the Internet continues to evolve, important questions to ask are whether the protocols are operating correctly, the topology is well co...
Prashant Rajvaidya, Kevin C. Almeroth
ADL
1999
Springer
107views Digital Library» more  ADL 1999»
15 years 8 months ago
Extending the Role of Metadata in a Digital Library System
We describe an approach to the development of a digital library system that is founded on a number of basic principles. In particular, we discuss the critical role of metadata in ...
Alexa T. McCray, Marie E. Gallagher, Michael A. Fl...
HOTOS
2009
IEEE
15 years 8 months ago
FlashVM: Revisiting the Virtual Memory Hierarchy
Flash memory is the largest change to storage in recent history. To date, most research has focused on integrating flash as persistent storage in file systems, with little emphasi...
Mohit Saxena, Michael M. Swift