Sciweavers

2169 search results - page 363 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
MOBIHOC
2008
ACM
14 years 8 months ago
Self-monitoring for sensor networks
Local monitoring is an effective mechanism for the security of wireless sensor networks (WSNs). Existing schemes assume the existence of sufficient number of active nodes to carry...
Dezun Dong, Yunhao Liu, Xiangke Liao
ISPASS
2010
IEEE
14 years 3 months ago
The Hadoop distributed filesystem: Balancing portability and performance
—Hadoop is a popular open-source implementation of MapReduce for the analysis of large datasets. To manage storage resources across the cluster, Hadoop uses a distributed user-le...
Jeffrey Shafer, Scott Rixner, Alan L. Cox
UIST
2009
ACM
14 years 3 months ago
CommunityCommands: command recommendations for software applications
We explore the use of modern recommender system technology to address the problem of learning software applications. Before describing our new command recommender system, we first...
Justin Matejka, Wei Li, Tovi Grossman, George W. F...
INFOCOM
2008
IEEE
14 years 3 months ago
Utility Max-Min Fair Congestion Control with Time-Varying Delays
Abstract—We present a framework for designing delayindependent end-to-end congestion control algorithms, where each end-user may have a different utility function. We only requir...
Konstantin Miller, Tobias Harks
DSN
2007
IEEE
14 years 3 months ago
Failure Resilience for Device Drivers
Studies have shown that device drivers and extensions contain 3–7 times more bugs than other operating system code and thus are more likely to fail. Therefore, we present a fail...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...