Sciweavers

15 search results - page 2 / 3
» Adding Availability to Log Services of Untrusted Machines
Sort
View
IMCSIT
2010
13 years 3 months ago
A web-based translation service at the UOC based on Apertium
In this paper, we describe the adaptation process of Apertium, a free/open-source rule-based machine translation platform which is operating in a number of different real-life cont...
Luis Villarejo, Mireia Farrus, Gema Ramírez...
KDD
2006
ACM
143views Data Mining» more  KDD 2006»
14 years 5 months ago
Mining for misconfigured machines in grid systems
Grid systems are proving increasingly useful for managing the batch computing jobs of organizations. One well known example for that is Intel which uses an internally developed sy...
Noam Palatin, Arie Leizarowitz, Assaf Schuster, Ra...
OSDI
2000
ACM
13 years 6 months ago
Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java
Single-language runtime systems, in the form of Java virtual machines, are widely deployed platforms for executing untrusted mobile code. These runtimes provide some of the featur...
Godmar Back, Wilson C. Hsieh, Jay Lepreau
SOSP
2007
ACM
14 years 2 months ago
Attested append-only memory: making adversaries stick to their word
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limit...
Byung-Gon Chun, Petros Maniatis, Scott Shenker, Jo...
EDBT
2008
ACM
161views Database» more  EDBT 2008»
13 years 7 months ago
Automatic content targeting on mobile phones
The mobile phone industry has reached a saturation point. With low growth rates and fewer new customers available to acquire, competition among mobile operators is now focused on ...
Giovanni Giuffrida, Catarina Sismeiro, Giuseppe Tr...