Sciweavers

160 search results - page 19 / 32
» Enforcer - Efficient Failure Injection
Sort
View
SP
2009
IEEE
129views Security Privacy» more  SP 2009»
14 years 2 months ago
CLAMP: Practical Prevention of Large-Scale Data Leaks
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...
TROB
2010
83views more  TROB 2010»
13 years 6 months ago
Passive-Set-Position-Modulation Framework for Interactive Robotic Systems
—We propose a novel framework, passive set-position modulation (PSPM), which enables us to connect a (continuoustime) robot’s position to a sequence of slowly-updating/sparse (...
Dongjun Lee, Ke Huang
SOSP
2003
ACM
14 years 4 months ago
Samsara: honor among thieves in peer-to-peer storage
Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement m...
Landon P. Cox, Brian D. Noble
ITNG
2010
IEEE
14 years 7 hour ago
QARI: Quality Aware Software Deployment for Wireless Sensor Networks
Abstract--If we are to deploy sensor applications in a realistic business context, we must provide innovative middleware services to control and enforce required system behavior; i...
Wouter Horré, Sam Michiels, Wouter Joosen, ...
COMAD
2009
13 years 8 months ago
Consistency of Databases on Commodity Disk Drives
Most database systems use ARIES-like logging and recovery scheme to recover from failures and guarantee transactional consistency. ARIES relies on the Write-Ahead Logging (WAL) pr...
Robin Dhamankar, Hanuma Kodavalla, Vishal Kathuria