Sciweavers

69 search results - page 5 / 14
» Design, implementation, and evaluation of transparent pNFS o...
Sort
View
OOPSLA
2004
Springer
14 years 1 days ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
INFOCOM
2005
IEEE
14 years 9 days ago
Design and implementation of network puzzles
Abstract— Client puzzles have been proposed in a number of protocols as a mechanism for mitigating the effects of distributed denial of service (DDoS) attacks. In order to provid...
Wu-chi Feng, Edward C. Kaiser, A. Luu
ECOOPW
1999
Springer
13 years 11 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
OZCHI
2006
ACM
14 years 20 days ago
Tangible tiles: design and evaluation of a tangible user interface in a collaborative tabletop setup
In this paper we describe a tangible user interface “Tangible Tiles”, which utilizes optically tracked transparent Plexiglass tiles for interaction and display of projected im...
Manuela Waldner, Jörg Hauber, Jürgen Zau...
FAST
2009
13 years 4 months ago
BORG: Block-reORGanization for Self-optimizing Storage Systems
This paper presents the design, implementation, and evaluation of BORG, a self-optimizing storage system that performs automatic block reorganization based on the observed I/O wor...
Medha Bhadkamkar, Jorge Guerra, Luis Useche, Sam B...