Network file storage with graceful performance degradation
نویسندگان
چکیده
منابع مشابه
Specifying Graceful Degradation
Complex programs are often required to display graceful degradation, reacting adaptively to changes in the environment. Under ideal circumstances, the program's behavior satisfies a set of application-dependent constraints. In the presence of events such as failures, timing anomalies, synchronization conflicts, or security breaches, certain constraints may become difficult or impossible to sati...
متن کاملGraceful degradation of speech recognition performance over packet-erasure networks
This paper explores packet loss recovery for automatic speech recognition (ASR) in spoken dialog systems, assuming an architecture in which a lightweight client communicates with a remote ASR server. Speech is transmitted with source and channel codes optimized for the ASR application, i.e., to minimize word error rate. Unequal amounts of forward error correction, depending on the data’s effect...
متن کاملGraceful degradation of speech recognition performance over lossy packet networks
This paper explores packet loss recovery in client-server Automatic Speech Recognition (ASR) systems. A forward error correction (FEC) system is designed and tested over several channel loss models, at variable amounts of data acquisition delay. In experiments with simulated packet loss, the FEC system provides robust ASR performance which degrades gracefully as packet loss rates increase. Comp...
متن کاملLeakage-Resilient Signatures with Graceful Degradation
We investigate new models and constructions which allow leakage-resilient signatures secure against existential forgeries, where the signature is much shorter than the leakage bound. Current models of leakage-resilient signatures against existential forgeries demand that the adversary cannot produce a new valid message/signature pair (m,σ) even after receiving some λ bits of leakage on the sign...
متن کاملGraceful Degradation under Resource Overbooking
It is trivial to write malicious code that hogs up a particular resource, for example, memory, disk, etc. Such malicious code can be written by intent (in order to degrade the system performance considerably) or by mistake (for example, memory leaks). As an effect of running such code the other applications running on the same machine suffer and their performance degrade considerably. The syste...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Storage
سال: 2005
ISSN: 1553-3077,1553-3093
DOI: 10.1145/1063786.1063788