Sciweavers

1988 search results - page 390 / 398
» Securing Information Transfer in Distributed Computing Envir...
Sort
View
ASPLOS
2010
ACM
14 years 2 months ago
SherLog: error diagnosis by connecting clues from run-time logs
Computer systems often fail due to many factors such as software bugs or administrator errors. Diagnosing such production run failures is an important but challenging task since i...
Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuan...
CCGRID
2008
IEEE
14 years 2 months ago
Advanced RDMA-Based Admission Control for Modern Data-Centers
—Current data-centers employ admission control mechanism to maintain low response time and high throughput under overloaded scenarios. Existing mechanisms use internal (on the ov...
Ping Lai, Sundeep Narravula, Karthikeyan Vaidyanat...
VLDB
1997
ACM
110views Database» more  VLDB 1997»
13 years 11 months ago
The Network as a Global Database: Challenges of Interoperability, Proactivity, Interactiveness, Legacy
The current integrated developments in network and computing give rise to a technical infrastructure for the information society which one may variously circumscribe by terms such...
Peter C. Lockemann, Ulrike Kölsch, Arne Kosch...
VRST
2005
ACM
14 years 1 months ago
Artistic reality: fast brush stroke stylization for augmented reality
The goal of augmented reality is to provide the user with a view of the surroundings enriched by virtual objects. Practically all augmented reality systems rely on standard realti...
Jan Fischer, Dirk Bartz, Wolfgang Straßer
ICISS
2009
Springer
13 years 5 months ago
BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
Abstract. Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual...
Vanessa Frías-Martínez, Salvatore J....