Sciweavers

1597 search results - page 103 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
CIDR
2007
105views Algorithms» more  CIDR 2007»
13 years 12 months ago
Turning Cluster Management into Data Management; A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt
PERCOM
2011
ACM
13 years 5 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
ACSAC
2009
IEEE
14 years 5 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...
SASO
2007
IEEE
14 years 4 months ago
e-SAFE: An Extensible, Secure and Fault Tolerant Storage System
With the rapidly falling price of hardware, and increasingly available bandwidth, the storage technology is seeing a paradigm shift from centralized and managed mode to distribute...
Sandip Agarwala, Arnab Paul, Umakishore Ramachandr...
JNW
2007
88views more  JNW 2007»
13 years 10 months ago
Resource Allocation Schemes in Integrated Heterogeneous Wireless and Mobile Networks
— Wireless and mobile networks have experienced a great success in the past few years. However, any single type of wireless and mobile network cannot meet all types of service re...
Wei Shen, Qing-An Zeng