Sciweavers

3257 search results - page 538 / 652
» networking 2004
Sort
View
ACSAC
2004
IEEE
15 years 8 months ago
Tracing the Root of "Rootable" Processes
In most existing systems, the authorization check for system resource access is based on the user ID of the running processes. Such systems are vulnerable to password stealing/cra...
Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
CLUSTER
2004
IEEE
15 years 8 months ago
An efficient end-host architecture for cluster communication
Cluster computing environments built from commodity hardware have provided a cost-effective solution for many scientific and high-performance applications. Likewise, middleware te...
Xin Qi, Gabriel Parmer, Richard West
141
Voted
DATE
2004
IEEE
185views Hardware» more  DATE 2004»
15 years 8 months ago
Energy-Aware System Design for Wireless Multimedia
In this paper, we present various challenges that arise in the delivery and exchange of multimedia information to mobile devices. Specifically, we focus on techniques for maintain...
Hans Van Antwerpen, Nikil D. Dutt, Rajesh K. Gupta...
DSRT
2004
IEEE
15 years 8 months ago
Exploring the Spatial Density of Strategy Models in a Realistic Distributed Interactive Application
As Distributed Interactive Applications (DIAs) become increasingly more prominent in the video game industry they must scale to accommodate progressively more users and maintain a...
Damien Marshall, Declan Delaney, Séamus McL...
IADIS
2004
15 years 6 months ago
A Scalable I/O Architecture and File System for Internet Servers
Most Internet services rely on the traditional client-server model, where the quality of services usually depends on the performance of those servers. In this paper, we propose a ...
Chei-Yol Kim, Sung-Hoon Sohn, Baik-Song Ahn, Gyu-I...