Sciweavers

250 search results - page 38 / 50
» Kanata: Adaptation and Evolution in Data Sharing Systems
Sort
View
SASO
2008
IEEE
14 years 2 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
IWPC
2002
IEEE
14 years 1 months ago
An Open Visualization Toolkit for Reverse Architecting
Maintenance and evolution of complex software systems (such as large telecom embedded devices) involve activities such as reverse engineering (RE) and software visualization. Alth...
Alexandru Telea, Alessandro Maccari, Claudio Riva
CAMP
2005
IEEE
14 years 2 months ago
Reinforcement Learning for P2P Searching
— For a peer-to-peer (P2P) system holding massive amount of data, an efficient and scalable search for resource sharing is a key determinant to its practical usage. Unstructured...
Luca Gatani, Giuseppe Lo Re, Alfonso Urso, Salvato...
EUROPAR
2007
Springer
14 years 2 months ago
Esodyp+: Prefetching in the Jackal Software DSM
Abstract. Prefetching transfers a data item in advance from its storage location to its usage location so that communication is hidden and does not delay computation. We present a ...
Michael Klemm, Jean Christophe Beyler, Ronny T. La...
HOTOS
1999
IEEE
14 years 23 days ago
The Box: A Replacement for Files
The file is a well-understood and very simple abstraction, which has been successfully used in both centralized and distributed systems. However, files are not expressive enough t...
Francisco J. Ballesteros, Sergio Arévalo