Sciweavers

2478 search results - page 307 / 496
» Message from the Chair
Sort
View
SRDS
2006
IEEE
15 years 10 months ago
Topology Sensitive Replica Selection
As the disks typically found in personal computers grow larger, protecting data by replicating it on a collection of “peer” systems rather than on dedicated high performance s...
Dmitry Brodsky, Michael J. Feeley, Norman C. Hutch...
HICSS
2005
IEEE
148views Biometrics» more  HICSS 2005»
15 years 9 months ago
Common Data Model for Design Document Exchange in Business-to-Business Networks
Design documents can be exchanged in business-tobusiness networks through Product Data Management (PDM) system integration. This rarely used approach provides new possibilities fo...
Katrine Jokinen, Jukka Borgman, Reijo Sulonen
ICECCS
2005
IEEE
125views Hardware» more  ICECCS 2005»
15 years 9 months ago
Model Checking Live Sequence Charts
Live Sequence Charts (LSCs) are a broad extension to Message Sequence Charts (MSCs) to capture complex interobject communication rigorously. A tool support for LSCs, named PlayEng...
Jun Sun 0001, Jin Song Dong
ISCA
2005
IEEE
135views Hardware» more  ISCA 2005»
15 years 9 months ago
Deconstructing Commodity Storage Clusters
The traditional approach for characterizing complex systems is to run standard workloads and measure the resulting performance as seen by the end user. However, unique opportuniti...
Haryadi S. Gunawi, Nitin Agrawal, Andrea C. Arpaci...
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
15 years 9 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...