Sciweavers

1744 search results - page 204 / 349
» The Steganographic File System
Sort
View
HICSS
2005
IEEE
158views Biometrics» more  HICSS 2005»
15 years 9 months ago
Social Networks in Peer-to-Peer Systems
The Gnutella protocol requires peers to broadcast messages to their neighbours when they search files. The message passing generates a lot of traffic in the network, which degrade...
Yamini Upadrashta, Julita Vassileva, Winfried K. G...
TAMODIA
2008
15 years 5 months ago
A Fluid Flow Approach to Usability Analysis of Multi-user Systems
Abstract. The analysis of usability aspects of multi-user systems, such as cooperative work systems and pervasive systems, pose particular problems because group behavior of their ...
Mieke Massink, Diego Latella, Maurice H. ter Beek,...
JAIR
2008
123views more  JAIR 2008»
15 years 4 months ago
CTL Model Update for System Modifications
Model checking is a promising technology, which has been applied for verification of many hardware and software systems. In this paper, we introduce the concept of model update to...
Yan Zhang, Yulin Ding
DOLAP
2010
ACM
15 years 2 months ago
Relational versus non-relational database systems for data warehousing
Relational database systems have been the dominating technology to manage and analyze large data warehouses. Moreover, the ER model, the standard in database design, has a close r...
Carlos Ordonez, Il-Yeol Song, Carlos Garcia-Alvara...
IPPS
2010
IEEE
15 years 1 months ago
DEBAR: A scalable high-performance de-duplication storage system for backup and archiving
We present DEBAR, a scalable and high-performance de-duplication storage system for backup and archiving, to overcome the throughput and scalability limitations of the state-of-th...
Tianming Yang, Hong Jiang, Dan Feng, Zhongying Niu...