Sciweavers

69 search results - page 5 / 14
» Trusted Storage: Focus on Use Cases
Sort
View
ICDCS
2008
IEEE
14 years 1 months ago
PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems
The multi-level storage architecture has been widely adopted in servers and data centers. However, while prefetching has been shown as a crucial technique to exploit the sequentia...
Zhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zho...
TKDE
2010
158views more  TKDE 2010»
13 years 5 months ago
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
—With the popularity of voting systems in cyberspace, there are growing evidence that the current voting systems can be manipulated by fake votes. This problem has attracted many...
Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yan...
IJWIN
2006
119views more  IJWIN 2006»
13 years 7 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
FGCS
2006
101views more  FGCS 2006»
13 years 7 months ago
Evaluating architectures for independently auditing service level agreements
Web and grid services are quickly maturing as a technology that allows for the integration of applications belonging to different administrative domains, enabling much faster and ...
Ana Carolina Barbosa, Jacques Philippe Sauvé...
ECIS
2001
13 years 8 months ago
The role of knowledge management in moving to a customer-focused organisation
Organisations are becoming increasingly more reliant on leveraging their information and knowledge to gain competitive advantage. The creation, storage and dissemination of inform...
Graeme G. Shanks, Emily Tay