Sciweavers

HOTOS
2003
IEEE
14 years 2 months ago
Privacy-Aware Location Sensor Networks
Advances in sensor networking and location tracking technology enable location-based applications but they also create significant privacy risks. Privacy is typically addressed t...
Marco Gruteser, Graham Schelle, Ashish Jain, Richa...
HOTOS
2003
IEEE
14 years 2 months ago
Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks
Y. Charlie Hu, Saumitra M. Das, Himabindu Pucha
HOTOS
2003
IEEE
14 years 2 months ago
FAB: Enterprise Storage Systems on a Shoestring
Abstract—A Federated Array of Bricks (FAB) is a logical disk system that provides the reliability and performance of enterprise-class disk arrays, at a fraction of the cost and w...
Svend Frølund, Arif Merchant, Yasushi Saito...
HOTOS
2003
IEEE
14 years 2 months ago
TCP Meets Mobile Code
Parveen Patel, David Wetherall, Jay Lepreau, Andre...
HOTOS
2003
IEEE
14 years 2 months ago
Sensing User Intention and Context for Energy Management
Sensors are emerging as a key area of interest in operating systems research, with a main focus on sensor networks. Turning the relationship around, we propose the use of low-powe...
Angela B. Dalton, Carla Schlatter Ellis
HOTOS
2003
IEEE
14 years 2 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris
HOTOS
2003
IEEE
14 years 2 months ago
The Case for a Session State Storage Layer
This paper motivates the need for a session state storage layer. Session state is used in a large class of applications. Existing session state storage solutions often rely on ad-...
Benjamin C. Ling, Armando Fox
HOTOS
2003
IEEE
14 years 2 months ago
Crash-Only Software
George Candea, Armando Fox
HOTOS
2003
IEEE
14 years 2 months ago
High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two
Peer-to-peer storage aims to build large-scale, reliable and available storage from many small-scale unreliable, low-availability distributed hosts. Data redundancy is the key to ...
Charles Blake, Rodrigo Rodrigues