Sciweavers

952 search results - page 161 / 191
» TreeFam: 2008 Update
Sort
View
FAST
2008
15 years 6 months ago
The RAID-6 Liberation Codes
The RAID-6 specification calls for a storage system with multiple storage devices to tolerate the failure of any two devices. Numerous erasure coding techniques have been develope...
James S. Plank
126
Voted
FLAIRS
2008
15 years 6 months ago
Recovering from Inconsistency in Distributed Simple Temporal Networks
Simple Temporal Networks (STNs) are frequently used in scheduling applications, as they provide a powerful and general tool for managing temporal constraints. One obstacle to thei...
Anthony Gallagher, Stephen F. Smith
164
Voted
USENIX
2008
15 years 6 months ago
Power-aware Remote Replication for Enterprise-level Disaster Recovery Systems
Electric energy consumed in data centers is rapidly growing. Power-aware IT, recently called `green IT', is widely recognized as a significant challenge. Disk storage is a no...
Kazuo Goda, Masaru Kitsuregawa
116
Voted
USENIX
2008
15 years 6 months ago
Experiences with Client-based Speculative Remote Display
We propose an approach to remote display systems in which the client predicts the screen update events that the server will send and applies them to the screen immediately, thus e...
John R. Lange, Peter A. Dinda, Samuel Rossoff
104
Voted
USS
2008
15 years 6 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller