Sciweavers

NOSSDAV
2005
Springer
14 years 3 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
NOSSDAV
2005
Springer
14 years 3 months ago
1-800-OVERLAYS: using overlay networks to improve VoIP quality
The cost savings and novel features associated with Voice over IP (VoIP) are driving its adoption by service providers. Such a transition however can successfully happen only if t...
Yair Amir, Claudiu Danilov, Stuart Goose, David He...
NOSSDAV
2005
Springer
14 years 3 months ago
The case for multi-tier camera sensor networks
In this position paper, we examine recent technology trends that have resulted in a broad spectrum of camera sensors, wireless radio technologies, and embedded sensor platforms wi...
Purushottam Kulkarni, Deepak Ganesan, Prashant J. ...
ICS
2005
Tsinghua U.
14 years 3 months ago
System noise, OS clock ticks, and fine-grained parallel applications
As parallel jobs get bigger in size and finer in granularity, “system noise” is increasingly becoming a problem. In fact, fine-grained jobs on clusters with thousands of SMP...
Dan Tsafrir, Yoav Etsion, Dror G. Feitelson, Scott...
EMSOFT
2005
Springer
14 years 3 months ago
Towards real-time enabled Microsoft Windows
Many computer scientists recognize the adverse relationship between Microsoft Windows, a general purpose operating system, which by design does not support Real Time, a specific ...
Alex Xiang Feng
STORAGESS
2005
ACM
14 years 3 months ago
Expecting the unexpected: adaptation for predictive energy conservation
The use of access predictors to improve storage device performance has been investigated for both improving access times, as well as a means of reducing energy consumed by the dis...
Jeffrey P. Rybczynski, Darrell D. E. Long, Ahmed A...
STORAGESS
2005
ACM
14 years 3 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
SIGCSE
2005
ACM
156views Education» more  SIGCSE 2005»
14 years 3 months ago
Experiences teaching operating systems using virtual platforms and linux
Operating system courses teach students much more when they provide hands-on kernel-level project experience with a real operating system. However, enabling a large class of stude...
Jason Nieh, Chris Vaill
ANCS
2005
ACM
14 years 3 months ago
Design considerations for network processor operating systems
Network processors (NPs) promise a flexible, programmable packet processing infrastructure for network systems. To make full use of the capabilities of network processors, it is ...
Tilman Wolf, Ning Weng, Chia-Hui Tai
WORDS
2005
IEEE
14 years 3 months ago
Functional and Non-Functional Properties in a Family of Embedded Operating Systems
The increasing complexity of embedded systems calls for software design and implementation techniques that support specialization without abandonment of reusability. This brings u...
Daniel Lohmann, Wolfgang Schröder-Preikschat,...