Sciweavers

231 search results - page 27 / 47
» Working set-based access control for network file systems
Sort
View
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
16 years 6 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
CLUSTER
2004
IEEE
15 years 8 months ago
JuxtaView - a tool for interactive visualization of large imagery on scalable tiled displays
JuxtaView is a cluster-based application for viewing ultra-high-resolution images on scalable tiled displays. We present in JuxtaView, a new parallel computing and distributed mem...
Naveen K. Krishnaprasad, Venkatram Vishwanath, Sha...
144
Voted
ACSAC
2001
IEEE
15 years 8 months ago
Java Security Extensions for a Java Server in a Hostile Environment
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web services. With the proliferation of network attacks on these network resources, ...
David M. Wheeler, Adam Conyers, Jane Luo, Alex Xio...
170
Voted
MOBIDE
2005
ACM
15 years 10 months ago
Towards universal mobile caching
In the context of mobile data access, data caching is fundamental for both performance and functionality. For this reason there have been many studies into developing energy-effi...
Ganesh Santhanakrishnan, Ahmed Amer, Panos K. Chry...
LCTRTS
2004
Springer
15 years 9 months ago
Spinach: a liberty-based simulator for programmable network interface architectures
This paper presents Spinach, a new simulator toolset specifically designed to target programmable network interface architectures. Spinach models both system components that are ...
Paul Willmann, Michael Brogioli, Vijay S. Pai