When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is the analysis and recovery of the compromised system. At a time when the cost o...
Ashvin Goel, Wu-chang Feng, David Maier, Wu-chi Fe...
This paper describes a system that supports high availability of data, until the data should be expunged, at which time it is impossible to recover the data. This design supports ...
This paper describes the integration of two new services aimed at assisting into the retrieval of video content from a Multimedia Asset Manager (MAM). The first tool suggest tags...
? In this paper we propose an adaptive scheduling and voltage/frequency selection algorithm which targets at energy harvesting systems. The proposed algorithm adjusts the processor...
The ever growing request for digital information raises the need for content distribution architectures providing high storage capacity, data availability and good performance. Wh...