Sciweavers

1222 search results - page 25 / 245
» Verifying a File System Implementation
Sort
View
EUC
2005
Springer
14 years 29 days ago
A Survey of Anonymous Peer-to-Peer File-Sharing
Abstract. This paper provides a survey of searchable, peer-to-peer filesharing systems that offer the user some form of anonymity. We start this survey by giving a brief descript...
Tom Chothia, Konstantinos Chatzikokolakis
ICDE
2007
IEEE
152views Database» more  ICDE 2007»
14 years 8 months ago
A Tool for Information Retrieval Research in Peer-to-Peer File Sharing Systems
We introduce IR-Wire, a tool for information retrieval research and education in peer-to-peer file-sharing systems. Built on top of LimeWire's implementation of the popular G...
Linh Thai Nguyen, Wai Gen Yee, Dongmei Jia, Ophir ...
ESAW
2007
Springer
14 years 1 months ago
Multi-agent Simulation to Implementation: A Practical Engineering Methodology for Designing Space Flight Operations
OCAMS is a practical engineering application of multi-agent systems technology, involving redesign of the tools and practices in a complex, distributed system. OCAMS is designed to...
William J. Clancey, Maarten Sierhuis, Chin Seah, C...
ADHOCNOW
2006
Springer
14 years 1 months ago
File System Support for Adjustable Resolution Applications in Sensor Networks
Flash memory is often the technology of choice for sensor networks because of its cost-effectiveness and attractive energy properties. In storage-constrained sensor network applica...
Vikram P. Munishwar, Sameer Tilak, Nael B. Abu-Gha...
TKDE
2008
111views more  TKDE 2008»
13 years 7 months ago
Efficient Remote Data Possession Checking in Critical Information Infrastructures
Checking data possession in networked information systems such as those related to critical infrastructures (power facilities, airports, data vaults, defense systems, and so forth)...
Francesc Sebé, Josep Domingo-Ferrer, Antoni...