Sciweavers

1239 search results - page 135 / 248
» Techniques for the Design of Java Operating Systems
Sort
View
CIDR
2007
177views Algorithms» more  CIDR 2007»
13 years 9 months ago
bdbms - A Database Management System for Biological Data
Biologists are increasingly using databases for storing and managing their data. Biological databases typically consist of a mixture of raw data, metadata, sequences, annotations,...
Mohamed Y. Eltabakh, Mourad Ouzzani, Walid G. Aref
TKDE
2008
105views more  TKDE 2008»
13 years 7 months ago
Evolutionary Optimization of File Assignment for a Large-Scale Video-on-Demand System
We present a genetic algorithm for tackling a file assignment problem for a large-scale video-on-demand system. The file assignment problem is to find the optimal replication and a...
Jun Guo, Yi Wang, Kit-Sang Tang, Sammy Chan, Eric ...
ATAL
2005
Springer
14 years 1 months ago
A decentralized bargaining protocol on dependent continuous multi-issue for approximate pareto optimal outcomes
Negotiation techniques have been demonstrated to be effective in solving complex multi-objective problems. When the optimization process operates on continuous variables, it can b...
Nicola Gatti, Francesco Amigoni
SIGSOFT
2010
ACM
13 years 5 months ago
Finding latent performance bugs in systems implementations
Robust distributed systems commonly employ high-level recovery mechanisms enabling the system to recover from a wide variety of problematic environmental conditions such as node f...
Charles Edwin Killian, Karthik Nagaraj, Salman Per...
IEEESP
2006
130views more  IEEESP 2006»
13 years 8 months ago
Securing Embedded Systems
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...