Sciweavers

58 search results - page 2 / 12
» Design, Implementation, and Performance of the LHAM Log-Stru...
Sort
View
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 5 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
NSDI
2010
13 years 6 months ago
Prophecy: Using History for High-Throughput Fault Tolerance
Byzantine fault-tolerant (BFT) replication has enjoyed a series of performance improvements, but remains costly due to its replicated work. We eliminate this cost for read-mostly ...
Siddhartha Sen, Wyatt Lloyd, Michael J. Freedman
CHI
1999
ACM
13 years 9 months ago
TouchCounters: Designing Interactive Electronic Labels for Physical Containers
We present TouchCounters, an integrated system of electronic modules, physical storage containers, and shelving surfaces for the support of collaborative physical work. Through ph...
Paul Yarin, Hiroshi Ishii
ICWE
2009
Springer
13 years 9 months ago
Semantic web access prediction using WordNet
The user observed latency of retrieving Web documents is one of limiting factors while using the Internet as an information data source. Prefetching became important technique ...
Lenka Hapalova
TMC
2010
386views more  TMC 2010»
13 years 3 months ago
Design, Realization, and Evaluation of xShare for Impromptu Sharing of Mobile Phones
—Mobile phones are truly personal devices loaded with personal data such as photos, contacts, and call history. Yet it is often necessary or desirable to share our phones with ot...
Yunxin Liu, Ahmad Rahmati, Hyukjae Jang, Yuanhe Hu...