Sciweavers

393 search results - page 58 / 79
» FIFO Communication Models in Operating Systems for Reconfigu...
Sort
View
141
Voted
CCS
2010
ACM
15 years 25 days ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
180
Voted
MM
2005
ACM
371views Multimedia» more  MM 2005»
15 years 8 months ago
Data grid for large-scale medical image archive and analysis
Storage and retrieval technology for large-scale medical image systems has matured significantly during the past ten years but many implementations still lack cost-effective backu...
H. K. Huang, Aifeng Zhang, Brent J. Liu, Zheng Zho...
DAIS
2006
15 years 4 months ago
Mobile Process Description and Execution
Abstract. Mobile devices are increasingly aware of their respective locations and vicinity and tend to communicate rather loosely with each other; therefore asynchronous communicat...
Christian P. Kunze, Sonja Zaplata, Winfried Lamers...
132
Voted
SACMAT
2004
ACM
15 years 8 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
102
Voted
SAC
2006
ACM
15 years 8 months ago
Post-partition reconciliation protocols for maintaining consistency
This paper addresses design exploration for protocols that are employed in systems with availability-consistency tradeoffs. Distributed data is modelled as states of objects repl...
Mikael Asplund, Simin Nadjm-Tehrani