Sciweavers

279 search results - page 40 / 56
» Providing Security in 4G Systems: Unveiling the Challenges
Sort
View
SOSP
2007
ACM
14 years 4 months ago
Tolerating byzantine faults in transaction processing systems using commit barrier scheduling
This paper describes the design, implementation, and evaluation of a replication scheme to handle Byzantine faults in transaction processing database systems. The scheme compares ...
Ben Vandiver, Hari Balakrishnan, Barbara Liskov, S...
IPPS
2002
IEEE
14 years 17 days ago
FARM: A Feedback-Based Adaptive Resource Management for Autonomous Hot-Spot Convergence System
Abstract— In this paper, we present a novel and comprehensive resource management solution for the autonomous hot-spot convergence system (AHSCS) that uses sensor web. This solut...
S. Swaminathan, G. Manimaran
ISI
2004
Springer
14 years 1 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
SIGUCCS
2003
ACM
14 years 27 days ago
Supporting a Windows XP/Red Hat Linux dual boot environment
Customers of public computing sites and faculty who use the public computer classrooms to teach want diversity in computing. Inevitably, there’s a group that does not want to te...
Bert Valenzuela
AGENTS
1997
Springer
13 years 11 months ago
Integrated Premission Planning and Execution for Unmanned Ground Vehicles
Fielding robots in complex applications can stress the human operators responsible for supervising them, particularly because the operators might understand the applications but n...
Edmund H. Durfee, Patrick G. Kenny, Karl C. Kluge