Sciweavers

1818 search results - page 331 / 364
» How users use access control
Sort
View
STORAGESS
2005
ACM
14 years 2 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
PPOPP
1999
ACM
14 years 1 months ago
Dynamic Instrumentation of Threaded Applications
The use of threads is becoming commonplace in both sequential and parallel programs. This paper describes our design and initial experience with non-trace based performance instru...
Zhichen Xu, Barton P. Miller, Oscar Naim
CHI
2010
ACM
14 years 3 months ago
An exploratory study of unsupervised mobile learning in rural India
CT Cellphones have the potential to improve education for the millions of underprivileged users in the developing world. However, mobile learning in developing countries remains un...
Anuj Kumar, Anuj Tewari, Geeta Shroff, Deepti Chit...
CLUSTER
2001
IEEE
14 years 20 days ago
Approximation Algorithms for Data Distribution with Load Balancing of Web Servers
Given the increasing traffic on the World Wide Web (Web), it is difficult for a single popular Web server to handle the demand from its many clients. By clustering a group of Web ...
Li-Chuan Chen, Hyeong-Ah Choi
CN
2007
137views more  CN 2007»
13 years 9 months ago
AID: A global anti-DoS service
Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the Internet, which is e...
Shigang Chen, Yibei Ling, Randy Chow, Ye Xia