• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,115
Next 10 →

KLAIM: a Kernel Language for Agents Interaction and Mobility

by Rocco De Nicola, Gianluigi Ferrari, Rosario Pugliese - IEEE Transactions on Software Engineering , 1997
"... We investigate the issue of designing a kernel programming language for Mobile Computing and describe Klaim, a language that supports a programming paradigm where processes, like data, can be moved from one computing environment to another. The language consists of a core Linda with multiple tuple s ..."
Abstract - Cited by 258 (62 self) - Add to MetaCart
spaces and of a set of operators for building processes. Klaim naturally supports programming with explicit localities. Localities are first-class data (they can be manipulated like any other data), but the language provides coordination mechanisms to control the interaction protocols among located

Scalable routing strategies for ad hoc wireless networks

by Atsushi Iwata, Ching-chuan Chiang, Guangyu Pei, Mario Gerla, Tsu-wei Chen - IEEE JSAC , 1999
"... In this paper, we consider a large population of mobile stations that are interconnected by a multihop wireless network. The applications of this wireless infrastructure range from ad hoc networking (e.g., collaborative, distributed computing) to disaster recovery (e.g., fire, flood, earthquake), l ..."
Abstract - Cited by 261 (15 self) - Add to MetaCart
), law enforcement (e.g., crowd control, search-and-rescue), and military (automated battlefield). Key characteristics of this system are the large number of users, their mobility, and the need to operate without the support of a fixed (wired or wireless) infrastructure. The last feature sets this system

Information flow control for standard OS abstractions

by Maxwell Krohn, Alexander Yip, Micah Brodsky, Natan Cliffer, M. Frans Kaashoek , Eddie Kohler , Robert Morris - IN SOSP , 2007
"... Decentralized Information Flow Control (DIFC) [24] is an approach to security that allows application writers to control how data flows between the pieces of an application and the outside world. As applied to privacy, DIFC allows untrusted software to compute with private data while trusted securit ..."
Abstract - Cited by 189 (11 self) - Add to MetaCart
DIFC model and system that applies at the granularity of operating system processes and standard OS abstractions (e.g., pipes and file descriptors). Flume eases DIFC’s use in existing applications and allows safe interaction between conventional and DIFC-aware processes. Flume runs as a user

The Design and Implementation of INGRES

by Michael Stonebraker, Eugene Wong, Peter Kreps, Gerald Held - TRANSACTIONS ON DATABASE SYSTEMS , 1976
"... The currently operational (March 1976) version of the INGRES database management system is described. This multiuser system gives a relational view of data, supports two high level nonprocedural data sublanguages, and runs as a collection of user processes on top of the UNIX operating system for Dig ..."
Abstract - Cited by 180 (19 self) - Add to MetaCart
The currently operational (March 1976) version of the INGRES database management system is described. This multiuser system gives a relational view of data, supports two high level nonprocedural data sublanguages, and runs as a collection of user processes on top of the UNIX operating system

The impact of operating system scheduling policies and synchronization methods of performance of parallel applications

by Anoop Gupta, Andrew Tucker, Shigeru Urushibara - In SIGMETRICS , 1991
"... Shared-memory multiprocessors are frequently used as compute servers with multiple parallel applications executing at the same time. In such environments, the efficiency of a parrdlel ap-plication can be significantly affected by the operating system scheduling policy. In this paper, we use detailed ..."
Abstract - Cited by 139 (2 self) - Add to MetaCart
Shared-memory multiprocessors are frequently used as compute servers with multiple parallel applications executing at the same time. In such environments, the efficiency of a parrdlel ap-plication can be significantly affected by the operating system scheduling policy. In this paper, we use

ARGOS – ORPHEUS-X2 User Interface

by L. Zalud, T. Neuzil, L. Kopecny
"... Abstract:- Orpheus reconnaissance robotic system Orpheus-X2 developed at Department of Control and Instrumentation is described. The paper is focused to ARGOS visualization software system for sensory supported visual telepresence control of mobile robots. The article describes augmented reality par ..."
Abstract - Add to MetaCart
Abstract:- Orpheus reconnaissance robotic system Orpheus-X2 developed at Department of Control and Instrumentation is described. The paper is focused to ARGOS visualization software system for sensory supported visual telepresence control of mobile robots. The article describes augmented reality

Power-Aware Operating Systems for Interactive Systems

by Yung-Hsiang Lu, Luca Benini, Giovanni De Micheli - IEEE Transactions on VLSI , 2002
"... Many portable systems deploy operating systems (OS) to support versatile functionality and to manage resources, including power. This paper presents a new approach for using OS to reduce the power consumption of IO devices in interactive systems. Low-power OS observes the relationship between hardwa ..."
Abstract - Cited by 45 (1 self) - Add to MetaCart
Many portable systems deploy operating systems (OS) to support versatile functionality and to manage resources, including power. This paper presents a new approach for using OS to reduce the power consumption of IO devices in interactive systems. Low-power OS observes the relationship between

Semantically Rich Application-Centric Security in Android

by Machigar Ongtang, Stephen Mclaughlin, William Enck, Patrick Mcdaniel - In ACSAC ’09: Annual Computer Security Applications Conference , 2009
"... Abstract—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this pape ..."
Abstract - Cited by 125 (8 self) - Add to MetaCart
Abstract—Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped

Container shipping: Operating system support for I/O-intensive applications

by Joseph Pasquale, Eric Anderson, San Diego, I Keith Muller, T Global, Information Solutions - IEEE Computer , 1994
"... Container shipping for interdomain transfers involves no physical copying. Its cost is proportional to the amount of data actually accessed, often a fraction of the data transferred. ew I/O devices with data rates ranging from 10 to 100 Mbytes per second are becoming available for personal computers ..."
Abstract - Cited by 60 (5 self) - Add to MetaCart
enabled I/O-intensive applica-tions for desktop computing that require input, processing, and output of very large amounts of data. In this article, we focus on an important aspect of operating system support for these applications: efficient transfer of large data objects be-tween the protection domains

On schemes of combinatorial transcription logic.

by Nicolas E Buchler , Ulrich Gerland , Terence Hwa - Proc. Natl. Acad. Sci. USA , 2003
"... Cells receive a wide variety of cellular and environmental signals, which are often processed combinatorially to generate specific genetic responses. Here we explore theoretically the potentials and limitations of combinatorial signal integration at the level of cisregulatory transcription control. ..."
Abstract - Cited by 141 (1 self) - Add to MetaCart
transcription system. Quantification of Combinatorial Transcription Control The activity of a gene is regulated by other genes through the concentrations of their gene products, the transcription factors (TFs). This is accomplished mechanically by the interaction of the TFs with their respective DNA targets
Next 10 →
Results 1 - 10 of 1,115
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University