• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,599
Next 10 →

Maté: A Tiny Virtual Machine for Sensor Networks

by Philip Levis, David Culler , 2002
"... Composed of tens of thousands of tiny devices with very limited resources ("motes"), sensor networks are subject to novel systems problems and constraints. The large number of motes in a sensor network means that there will often be some failing nodes; networks must be easy to repopu-late. ..."
Abstract - Cited by 510 (21 self) - Add to MetaCart
capsules enable the deploy-ment of ad-hoc routing and data aggregation algorithms. Maté's concise, high-level program representation simplifies programming and allows large networks to be frequently re-programmed in an energy-efficient manner; in addition, its safe execution environment suggests a use

Extensibility, safety and performance in the SPIN operating system

by Brian N. Bershad, Stefan Savage, Przemys Pardyak, Emin Gun Sirer, Marc E. Fiuczynski, David Becker, Craig Chambers, Susan Eggers , 1995
"... This paper describes the motivation, architecture and performance of SPIN, an extensible operating system. SPIN provides an extension infrastructure, together with a core set of extensible services, that allow applications to safely change the operating system's interface and implementation. Ex ..."
Abstract - Cited by 458 (16 self) - Add to MetaCart
This paper describes the motivation, architecture and performance of SPIN, an extensible operating system. SPIN provides an extension infrastructure, together with a core set of extensible services, that allow applications to safely change the operating system's interface and implementation

Making the future safe for the past: Adding Genericity to the Java Programming Language

by Gilad Bracha , Martin Odersky, David Stoutamire, Philip Wadler , 1998
"... We present GJ, a design that extends the Java programming language with generic types and methods. These are both explained and implemented by translation into the unextended language. The translation closely mimics the way generics are emulated by programmers: it erases all type parameters, maps ty ..."
Abstract - Cited by 372 (16 self) - Add to MetaCart
We present GJ, a design that extends the Java programming language with generic types and methods. These are both explained and implemented by translation into the unextended language. The translation closely mimics the way generics are emulated by programmers: it erases all type parameters, maps

Practical Byzantine fault tolerance and proactive recovery

by Miguel Castro, Barbara Liskov - ACM Transactions on Computer Systems , 2002
"... Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions and they can cause arbitrary behavior, that is, B ..."
Abstract - Cited by 410 (7 self) - Add to MetaCart
, Byzantine faults. This article describes a new replication algorithm, BFT, that can be used to build highly available systems that tolerate Byzantine faults. BFT can be used in practice to implement real services: it performs well, it is safe in asynchronous environments such as the Internet

Experiences with an Interactive Museum Tour-Guide Robot

by Wolfram Burgard , Armin B. Cremers, Dieter Fox, Dirk Hähnel, Gerhard Lakemeyer, Dirk Schulz , Walter Steiner, Sebastian Thrun , 1998
"... This article describes the software architecture of an autonomous, interactive tour-guide robot. It presents a modular and distributed software architecture, which integrates localization, mapping, collision avoidance, planning, and various modules concerned with user interaction and Web-based telep ..."
Abstract - Cited by 329 (72 self) - Add to MetaCart
's operation. Special emphasis is placed on the design of interactive capabilities that appeal to people's intuition. The interface provides new means for human-robot interaction with crowds of people in public places, and it also provides people all around the world with the ability to establish a "

Reliable Sockets

by Victor C. Zandy, Barton P. Miller , 2001
"... Reliable Sockets (rocks) are a portable, user-level replacement to the sockets interface that transparently protects applications from network connection failures. Rocks preserve TCP connections and UDP sessions across failures that commonly arise in mobile computing, including host movement, netw ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Reliable Sockets (rocks) are a portable, user-level replacement to the sockets interface that transparently protects applications from network connection failures. Rocks preserve TCP connections and UDP sessions across failures that commonly arise in mobile computing, including host movement

Basic Socket Interface Extensions for

by M. Komu, T. Henderson , 2011
"... This document defines extensions to the current sockets API for the Host Identity Protocol (HIP). The extensions focus on the use of public-key-based identifiers discovered via DNS resolution, but also define interfaces for manual bindings between Host Identity Tags (HITs) and locators. With the ext ..."
Abstract - Add to MetaCart
This document defines extensions to the current sockets API for the Host Identity Protocol (HIP). The extensions focus on the use of public-key-based identifiers discovered via DNS resolution, but also define interfaces for manual bindings between Host Identity Tags (HITs) and locators

Service Sockets: Design, Implementation and Interfaces

by Michael Schmitt, Anurag Acharya, Max Ibel , 1999
"... As network services have evolved, their communication structures have become increasingly complex. This increase in the complexity in the communication structure of services is mirrored by an increase in the complexity of the client code that interacts with and administers these services. In this ..."
Abstract - Add to MetaCart
, the familiar programming interface and the ease-of-use of Berkeley Sockets. The other attractive feature of the Service Sockets design is its modular construction: the service-specific components of a Service Sockets implement well-defined interfaces. Modularizing the different aspects of a service into a

Safe hardware access with the Xen virtual machine monitor

by Keir Fraser, Steven H, Rolf Neugebauer, Ian Pratt, Andrew Warfield, Mark Williamson - In 1st Workshop on Operating System and Architectural Support for the on demand IT InfraStructure (OASIS , 2004
"... The Xen virtual machine monitor allows multiple operating systems to execute concurrently on commodity x86 hardware, providing a solution for server consolidation and utility computing. In our initial design, Xen itself contained device-driver code and provided safe shared virtual device access. In ..."
Abstract - Cited by 138 (8 self) - Add to MetaCart
. In this paper we present our new Safe Hardware Interface, an isolation architecture used within the latest release of Xen which allows unmodified device drivers to be shared across isolated operating system instances, while protecting individual OSs, and the system as a whole, from driver failure. 1

SOVIA: A User-level Sockets Layer over Virtual Interface Architecture

by Jin-soo Kim, Kangho Kim, Sung-in Jung - In Cluster Computing , 2001
"... The Virtual Interface Architecture (VIA) is an industry standard user-level communication architecture for system area networks. The VIA provides a protected, directlyaccessible interface to a network hardware, removing the operating system from the critical communication path. In this paper, we des ..."
Abstract - Cited by 53 (0 self) - Add to MetaCart
The Virtual Interface Architecture (VIA) is an industry standard user-level communication architecture for system area networks. The VIA provides a protected, directlyaccessible interface to a network hardware, removing the operating system from the critical communication path. In this paper, we
Next 10 →
Results 1 - 10 of 1,599
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University