Sciweavers

260 search results - page 38 / 52
» Quantifying the performance isolation properties of virtuali...
Sort
View
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
14 years 2 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
SUTC
2006
IEEE
14 years 1 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
RAS
2008
167views more  RAS 2008»
13 years 6 months ago
Bio-mimetic impedance control of robotic manipulator for dynamic contact tasks
A human performs a variety of skillful movements by adjusting dynamic characteristics of his or her musculoskeletal system according to a task involved. Such characteristics of hu...
Toshio Tsuji, Yoshiyuki Tanaka
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
14 years 1 months ago
Outlier Detection for Fine-grained Load Balancing in Database Clusters
Recent industry trends towards reducing the costs of ownership in large data centers emphasize the need for database system techniques for both automatic performance tuning and ef...
Jin Chen, Gokul Soundararajan, Madalin Mihailescu,...
EUROMICRO
2009
IEEE
13 years 11 months ago
Service Redundancy Strategies in Service-Oriented Architectures
Redundancy can improve the availability of components in service-oriented systems. However, predicting and quantifying the effects of different redundancy strategies can be a comp...
Nicholas R. May, Heinz W. Schmidt, Ian E. Thomas