Sciweavers

2604 search results - page 183 / 521
» Human Errors and System Requirements
Sort
View
SOSP
2005
ACM
14 years 6 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
USENIX
2007
13 years 11 months ago
SafeStore: A Durable and Practical Storage System
This paper presents SafeStore, a distributed storage system designed to maintain long-term data durability despite conventional hardware and software faults, environmental disrupt...
Ramakrishna Kotla, Lorenzo Alvisi, Michael Dahlin
ECIS
2004
13 years 10 months ago
Adverse Events in Hospitals: The Contribution of Poor Information Systems
Adverse events in hospitals, events in which harm results to a person receiving health care, are well documented (Wilson 1995, Hepler 2001). However, while factors such as lack of...
Reeva M. Lederman
FC
2010
Springer
181views Cryptology» more  FC 2010»
14 years 1 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
PPOPP
2010
ACM
14 years 6 months ago
Is transactional programming actually easier?
Chip multi-processors (CMPs) have become ubiquitous, while tools that ease concurrent programming have not. The promise of increased performance for all applications through ever ...
Christopher J. Rossbach, Owen S. Hofmann, Emmett W...