Sciweavers

1522 search results - page 139 / 305
» Requirements analysis for large scale systems
Sort
View
EUROSYS
2009
ACM
14 years 6 months ago
Migrating server storage to SSDs: analysis of tradeoffs
Recently, flash-based solid-state drives (SSDs) have become standard options for laptop and desktop storage, but their impact on enterprise server storage has not been studied. P...
Dushyanth Narayanan, Eno Thereska, Austin Donnelly...
HASE
1998
IEEE
14 years 1 months ago
A Firewalling Scheme for Securing MPOA-Based Enterprise Networks
A well-known security problem with MPOA is that cutthrough connections generally bypasses firewall routers if there are any. None of the previously proposed approaches solved the ...
Jun Xu, Mukesh Singhal
NCA
2008
IEEE
14 years 3 months ago
Quicksilver Scalable Multicast (QSM)
QSM is a multicast engine designed to support a style of distributed programming in which application objects are replicated among clients and updated via multicast. The model req...
Krzysztof Ostrowski, Ken Birman, Danny Dolev
ICMCS
2006
IEEE
142views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Tricodes: A Barcode-Like Fiducial Design for Augmented Reality Media
Visual markers, or fiducials, have become one of the most common methods of camera pose estimation in Augmented Reality (AR) media. Many present day fiducial-based AR systems us...
Jonathan Mooser, Suya You, Ulrich Neumann
IPTPS
2003
Springer
14 years 2 months ago
Enforcing Fair Sharing of Peer-to-Peer Resources
Cooperative peer-to-peer applications are designed to share the resources of each computer in an overlay network for the common good of everyone. However, users do not necessarily...
Tsuen-Wan Ngan, Dan S. Wallach, Peter Druschel