Sciweavers

10435 search results - page 267 / 2087
» Measuring system normality
Sort
View
SC
2004
ACM
14 years 3 months ago
Kosha: A Peer-to-Peer Enhancement for the Network File System
This paper presents Kosha, a peer-to-peer (p2p) enhancement for the widely-used Network File System (NFS). Kosha harvests redundant storage space on cluster nodes and user desktop...
Ali Raza Butt, Troy A. Johnson, Yili Zheng, Y. Cha...
CCGRID
2003
IEEE
14 years 3 months ago
Criticality-based Analysis and Design of Unstructured Peer-to-Peer Networks as "Complex Systems"
— Due to enormous complexity of the unstructured peer-to-peer networks as large-scale, self-configure, and dynamic systems, the models used to characterize these systems are eit...
Farnoush Banaei Kashani, Cyrus Shahabi
DATE
2005
IEEE
119views Hardware» more  DATE 2005»
14 years 3 months ago
Functional Validation of System Level Static Scheduling
Increase in system level modeling has given rise to a need for efficient functional validation of models above cycle accurate level. This paper presents a technique for comparing...
Samar Abdi, Daniel D. Gajski
INTERSPEECH
2010
13 years 4 months ago
Language model cross adaptation for LVCSR system combination
State-of-the-art large vocabulary continuous speech recognition (LVCSR) systems often combine outputs from multiple subsystems developed at different sites. Cross system adaptatio...
Xunying Liu, Mark J. F. Gales, Philip C. Woodland
COMPSAC
2009
IEEE
14 years 4 months ago
Defending Battery Exhaustion Attacks on Mobile Systems
Battery Exhaustion Attack is a “denial of service” attack on mobile devices, causing more battery discharge than normally necessary. The excessive discharge arises out of the ...
Sungyong Shin, Taek Lee, Hoh Peter In