Sciweavers

2639 search results - page 404 / 528
» Pen Computing: Challenges and Applications
Sort
View
IEEEARES
2009
IEEE
15 years 11 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
PERCOM
2009
ACM
15 years 11 months ago
QoS Enabled Mobility Support for Mesh Networks
Abstract—Existing solutions for building wireless mesh networks suffer from reduced efficiency. This is due to lack of reliable self-configuration procedures that can dynamical...
Dario Gallucci, Silvia Giordano
P2P
2009
IEEE
15 years 10 months ago
On Tracking Freeriders in Gossip Protocols
Peer-to-peer content dissemination applications suffer immensely from freeriders, i.e., nodes that do not provide their fair share. The Tit-for-Tat (TfT) incentives have received ...
Rachid Guerraoui, Kévin Huguenin, Anne-Mari...
ISCA
2009
IEEE
178views Hardware» more  ISCA 2009»
15 years 10 months ago
Thread motion: fine-grained power management for multi-core systems
Dynamic voltage and frequency scaling (DVFS) is a commonly-used powermanagement scheme that dynamically adjusts power and performance to the time-varying needs of running programs...
Krishna K. Rangan, Gu-Yeon Wei, David Brooks
ISORC
2009
IEEE
15 years 10 months ago
Property Preservation and Composition with Guarantees: From ASSERT to CHESS
While the demand for high-integrity applications continues to rise, industrial developers seek cost effective development strategies that are capable of delivering the required gu...
Tullio Vardanega