Results 1 - 10
of
3,187
Transcoding Internet Content For Heterogeneous Client Devices
- In Proceedings of the IEEE International Symposium on Circuits and Systems
, 1998
"... There is a growing diversity of client devices that have access to the Internet. However, much of the contenton the Internet cannot be handled by the devices that have limited communication, processing, storage and display capabilities. In order to improve the utility of a wide range of client devi ..."
Abstract
-
Cited by 45 (5 self)
- Add to MetaCart
There is a growing diversity of client devices that have access to the Internet. However, much of the contenton the Internet cannot be handled by the devices that have limited communication, processing, storage and display capabilities. In order to improve the utility of a wide range of client
Intelligent Automated Diagnosis of Client Device Bottlenecks
- in Private Clouds,” in Proceedings of IEEE UCC 11
, 2011
"... Abstract—We present an automated solution for rapid diagnosis of client device problems in private cloud environ-ments: the Intelligent Automated Client Diagnostic (IACD) system. Clients are diagnosed with the aid of Transmission Control Protocol (TCP) packet traces, by (i) observation of anomalous ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Abstract—We present an automated solution for rapid diagnosis of client device problems in private cloud environ-ments: the Intelligent Automated Client Diagnostic (IACD) system. Clients are diagnosed with the aid of Transmission Control Protocol (TCP) packet traces, by (i) observation of anomalous
Storage Power Optimizations for Client Devices and Data Centers
"... Storage devices are essential to all computing systems that store user data from desktops, to notebooks and Ultrabooks ™ to data centers. Hard disk drives (HDDs) or solid state drives (SSDs) are today’s most popular storage solutions. Active power for storage devices has significant impact on the ba ..."
Abstract
- Add to MetaCart
on the battery life of client devices. In the data center, the amount of energy required for thousands of HDDs/SSDs competes with that of small cities. In this article, we propose a range of storage power optimization techniques that apply equally well to client devices and data centers. A number of power
Protecting E-healthcare Client Devices against Malware and Physical Theft
"... The growing adoption of electronic medical records will require that healthcare professionals and patients are able to access health information on devices such as laptops, personal computers, and even smart phones. Due to the sensitive nature of such information, it is important to secure client-si ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
The growing adoption of electronic medical records will require that healthcare professionals and patients are able to access health information on devices such as laptops, personal computers, and even smart phones. Due to the sensitive nature of such information, it is important to secure client
The design and implementation of an intentional naming system
- 17TH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '99) PUBLISHED AS OPERATING SYSTEMS REVIEW, 34(5):186--201, DEC. 1999
, 1999
"... This paper presents the design and implementation of the Intentional Naming System (INS), a resource discovery and service location system for dynamic and mobile networks of devices and computers. Such environments require a naming system that is (i) expressive, to describe and make requests based o ..."
Abstract
-
Cited by 518 (14 self)
- Add to MetaCart
This paper presents the design and implementation of the Intentional Naming System (INS), a resource discovery and service location system for dynamic and mobile networks of devices and computers. Such environments require a naming system that is (i) expressive, to describe and make requests based
Client Device Based Content Adaptation Using Rule Base
"... Abstract: Problem statement: Content adaptation have been playing an important role in mobile devices, wherein the content display differs from desktop computers in many aspects, such as display screens, processing power, network connection bandwidth. In order to display web contents appropriately o ..."
Abstract
- Add to MetaCart
based on rules created for mobile devices. Rules are invoked based on the individual client device information. Results: The adaptation has been performed according to the delivery device which was formalized through the profiler system. A profile holds information about the hardware and software
The SLAM project: debugging system software via static analysis
- SIGPLAN Not
"... Abstract. The goal of the SLAM project is to check whether or not a program obeys "API usage rules " that specif[y what it means to be a good client of an API. The SLAM toolkit statically analyzes a C program to determine whether or not it violates given usage rules. The toolkit has two un ..."
Abstract
-
Cited by 472 (17 self)
- Add to MetaCart
Abstract. The goal of the SLAM project is to check whether or not a program obeys "API usage rules " that specif[y what it means to be a good client of an API. The SLAM toolkit statically analyzes a C program to determine whether or not it violates given usage rules. The toolkit has two
Trusted Virtual Platforms: A Key Enabler for Converged Client Devices
"... This paper introduces our work around combining machine virtualization technology with Trusted Computing Group technology. We first describe our architecture for reducing and containing the privileged code of the Xen Hypervisor. Secondly we describe our Trusted Virtual Platform architecture. This is ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
and reporting framework. This is designed to reflect all the dependencies of the virtual environment of a guest operating system. The work is a core enabling component of our research around converged devices – client platforms such as notebooks or desktop PCs that can safely host multiple virtual operating
Extracting Potential Forensic Evidences from Cloud Client Device using own Cloud as a Case Study
"... The highly distribution of cloud storage as a mean to store data rises the need to find a suitable forensic methods to extract forensic evidences during investigating criminal or illegal activities on cloud accounts. Most accurate evidences can be extracted from cloud serves; however forensic invest ..."
Abstract
- Add to MetaCart
investigators cannot grant access to cloud servers due to privacy policies followed by cloud providers. Actually, amount of evidences can be extracted from client devices that may be of forensic investigator’s interests. This research utilizes open source cloud software to study cloud client structure
Automatically validating temporal safety properties of interfaces
, 2001
"... We present a process for validating temporal safety properties of software that uses a well-defined interface. The process requires only that the user state the property of interest. It then automatically creates abstractions of C code using iterative refinement, based on the given property. The pro ..."
Abstract
-
Cited by 433 (21 self)
- Add to MetaCart
. The process is realized in the SLAM toolkit, which consists of a model checker, predicate abstraction tool and predicate discovery tool. We have applied the SLAM toolkit to a number of Windows NT device drivers to validate critical safety properties such as correct locking behavior. We have found
Results 1 - 10
of
3,187