Sciweavers

1022 search results - page 197 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
ICS
2004
Tsinghua U.
14 years 1 months ago
Energy conservation techniques for disk array-based servers
In this paper, we study energy conservation techniques for disk array-based network servers. First, we introduce a new conservation technique, called Popular Data Concentration (P...
Eduardo Pinheiro, Ricardo Bianchini
IWCMC
2010
ACM
14 years 21 days ago
Estimating routing symmetry on single links by passive flow measurements
The assumption of routing symmetry is often embedded into traffic analysis and classification tools. This paper uses passively captured network data to estimate the amount of tra...
Wolfgang John, Maurizio Dusi, Kimberly C. Claffy
HUC
2010
Springer
13 years 8 months ago
MoviPill: improving medication compliance for elders using a mobile persuasive social game
Medication compliance is a critical component in the success of any medical treatment. However, only 50% of patients correctly adhere to their prescription regimens. Mobile and ub...
Rodrigo de Oliveira, Mauro Cherubini, Nuria Oliver
SAC
2011
ACM
12 years 10 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty
DAC
2006
ACM
14 years 8 months ago
HybDTM: a coordinated hardware-software approach for dynamic thermal management
With ever-increasing power density and cooling costs in modern high-performance systems, dynamic thermal management (DTM) has emerged as an effective technique for guaranteeing th...
Amit Kumar 0002, Li Shang, Li-Shiuan Peh, Niraj K....