Zobrazeno 31 - 40
of 186
pro vyhledávání: '"Andrew S. Tanenbaum"'
Publikováno v:
Proceedings of the ACM/IFIP/USENIX Middleware Conference, 133-144
STARTPAGE=133;ENDPAGE=144;TITLE=Proceedings of the ACM/IFIP/USENIX Middleware Conference
Giuffrida, C, Iorgulescu, C & Tanenbaum, A S 2014, Mutable Checkpoint-Restart: Automating Live Update for Generic Server Programs . in Proceedings of the ACM/IFIP/USENIX Middleware Conference . ACM, pp. 133-144 . https://doi.org/10.1145/2663165.2663328
Middleware
STARTPAGE=133;ENDPAGE=144;TITLE=Proceedings of the ACM/IFIP/USENIX Middleware Conference
Giuffrida, C, Iorgulescu, C & Tanenbaum, A S 2014, Mutable Checkpoint-Restart: Automating Live Update for Generic Server Programs . in Proceedings of the ACM/IFIP/USENIX Middleware Conference . ACM, pp. 133-144 . https://doi.org/10.1145/2663165.2663328
Middleware
The pressing demand to deploy software updates without stopping running programs has fostered much research on live update systems in the past decades. Prior solutions, however, either make strong assumptions on the nature of the update or require ex
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0f6a116515148734b0582c2271d69c86
https://research.vu.nl/en/publications/1487b09e-a7c6-4f84-b28f-00a00c9d421d
https://research.vu.nl/en/publications/1487b09e-a7c6-4f84-b28f-00a00c9d421d
Publikováno v:
Jansen, M, Klaver, E, Verkaik, P, van Steen, M R & Tanenbaum, A S 2001, ' Encapsulating Distribution by Remote Objects ', Information and Software Technology, vol. 43, no. 6, pp. 353-363 . https://doi.org/10.1016/S0950-5849(00)00174-9
Information and Software Technology, 43(6), 353-363. Elsevier
Information and Software Technology, 43(6), 353-363. Elsevier
Middleware for modern office environments and many other application areas needs to provide support for a myriad of different, highly mobile objects. At the same time, it should be able to scale to vast numbers of objects that may possibly be dispers
Publikováno v:
Computer Communications. 24:232-240
Replicating Web documents reduces user-perceived delays and wide-area network traffic. Numerous caching and replication protocols have been proposed to manage such replication while keeping the document copies consistent. We claim, however, that no s
Publikováno v:
PRDC
In this paper, we describe the emerging concept of namespace modules: operating system components that are responsible for constructing a hierarchical file system namespace based on one or more individual underlying file objects. We show that the lik
Publikováno v:
2013 International Conference on Parallel and Distributed Systems.
Publikováno v:
IEEE Concurrency, 70-78. IEEE Computer Society
STARTPAGE=70;ENDPAGE=78;ISSN=1092-3063;TITLE=IEEE Concurrency
van Steen, M R, Homburg, P C & Tanenbaum, A S 1999, ' Globe: A Wide-Area Distributed System ', IEEE Concurrency, pp. 70-78 . https://doi.org/10.1109/4434.749137
STARTPAGE=70;ENDPAGE=78;ISSN=1092-3063;TITLE=IEEE Concurrency
van Steen, M R, Homburg, P C & Tanenbaum, A S 1999, ' Globe: A Wide-Area Distributed System ', IEEE Concurrency, pp. 70-78 . https://doi.org/10.1109/4434.749137
The authors present an object-based framework for developing wide-area distributed applications. The World Wide Web's current performance problems illustrate the benefit of encapsulating state, operations, and implementation strategies on a per-objec
Autor:
Andrew S. Tanenbaum, Todd Austin
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Structured Computer Organization, specifically written for undergraduate students, is a best-s
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Computer Networks, 5/e is appropriate for Computer Networking or Introduction to Networking co
Publikováno v:
Rieback, M R, Crispo, B & Tanenbaum, A S 2006, ' RFID Malware: Truth vs. Myth ', IEEE Security & Privacy, vol. 4, no. 4, 1668007, pp. 70-72 . https://doi.org/10.1109/MSP.2006.102
IEEE Security & Privacy, 4(4):1668007, 70-72. Institute of Electrical and Electronics Engineers Inc.
IEEE Security & Privacy, 4(4):1668007, 70-72. Institute of Electrical and Electronics Engineers Inc.
The issues related to RFID malware along with proof-of-concept RFID virus are discussed. RFID exploits are traditionally hacking attacks that are identical to those found on Internet, such as buffer overflow, code insertion, and SQL injection attack.
Autor:
Andrew S. Tanenbaum
Publikováno v:
ACM SIGOPS Operating Systems Review. 31:5-17