Sciweavers

6110 search results - page 80 / 1222
» Graceful Network Operations
Sort
View
DEBU
2010
128views more  DEBU 2010»
13 years 7 months ago
Panda: A System for Provenance and Data
Panda (for Provenance and Data) is a new project whose goal is to develop a general-purpose system that unifies concepts from existing provenance systems and overcomes some limita...
Robert Ikeda, Jennifer Widom
STORAGESS
2005
ACM
14 years 3 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
SIGMOD
2005
ACM
139views Database» more  SIGMOD 2005»
14 years 9 months ago
Distributed operation in the Borealis stream processing engine
Borealis is a distributed stream processing engine that is being developed at Brandeis University, Brown University, and MIT. Borealis inherits core stream processing functionalit...
Yanif Ahmad, Bradley Berg, Ugur Çetintemel,...
WWIC
2005
Springer
112views Communications» more  WWIC 2005»
14 years 3 months ago
Mitigating Interference Between IEEE 802.16 Systems Operating in License-Exempt Mode
A rudimentary approach to mitigate interference issues in license-exempt 802.16 systems is presented. This approach operates by permitting each Base Station (BS), and associated Su...
Omar Ashagi, Seán Murphy, Liam Murphy
WSC
2000
13 years 11 months ago
Simulation software: an Operational Research Society survey of academic and industrial users
Simulation modeling is being widely used in areas such as manufacturing, health, network communications and military. Such popularity of simulation has resulted in a large number ...
Vlatka Hlupic