Sciweavers

715 search results - page 38 / 143
» Operating System Management of MEMS-based Storage Devices
Sort
View
SAC
2006
ACM
14 years 1 months ago
Personalization and visualization on handheld devices
The small screen size of handheld mobile devices poses an inherent problem in visualizing data: very often it is too difficult and unpleasant to navigate through the plethora of p...
Dongsong Zhang, George Karabatis, Zhiyuan Chen, Bo...
PERCOM
2007
ACM
14 years 7 months ago
SHAD: A Human-Centered Security Architecture for the Plan B Operating System
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
LCTRTS
2005
Springer
14 years 1 months ago
Upper bound for defragmenting buddy heaps
Knuth’s buddy system is an attractive algorithm for managing storage allocation, and it can be made to operate in real-time. At some point, storage-management systems must eithe...
Delvin C. Defoe, Sharath R. Cholleti, Ron Cytron
CEC
2003
IEEE
13 years 11 months ago
A genetic algorithm for energy efficient device scheduling in real-time systems
Most embedded systemshave tightconstraints on power consumption because the amonnt of power available to these systems is limited due to the limitation ofbattery life. For this rea...
Lirong Tian, Tughrul Arslan
STORAGESS
2005
ACM
14 years 1 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...