Sciweavers

1826 search results - page 208 / 366
» Controlling data movement in global computing applications
Sort
View
CODES
2005
IEEE
15 years 10 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
15 years 11 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
TON
1998
87views more  TON 1998»
15 years 4 months ago
Adaptive hybrid clock discipline algorithm for the network time protocol
This paper describes the analysis, implementation and performance of a new algorithm engineered to discipline a computer clock to a source of standard time, such as a GPS receiver...
David L. Mills
PVLDB
2011
14 years 7 months ago
CoHadoop: Flexible Data Placement and Its Exploitation in Hadoop
Hadoop has become an attractive platform for large-scale data analytics. In this paper, we identify a major performance bottleneck of Hadoop: its lack of ability to colocate relat...
Mohamed Y. Eltabakh, Yuanyuan Tian, Fatma Özc...
PERCOM
2010
ACM
15 years 8 months ago
Adaptive deployment for pervasive data gathering in connectivity-challenged environments
—Some current and future pervasive data driven applications must operate in ”extreme” environments where endto-end connectivity cannot be guaranteed at all times. In fact, it...
Tahiry Razafindralambo, Nathalie Mitton, Aline Car...