Sciweavers

1453 search results - page 4 / 291
» State and history in operating systems
Sort
View
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 6 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
UIST
2000
ACM
13 years 10 months ago
A temporal model for multi-level undo and redo
A number of recent systems have provided rich facilities for manipulating the timelines of applications. Such timelines represent the history of an application’s use in some ses...
W. Keith Edwards, Takeo Igarashi, Anthony LaMarca,...
VLDB
2004
ACM
111views Database» more  VLDB 2004»
13 years 11 months ago
Lifting the Burden of History from Adaptive Query Processing
Adaptive query processing schemes attempt to reoptimize query plans during the course of query execution. A variety of techniques for adaptive query processing have been proposed,...
Amol Deshpande, Joseph M. Hellerstein
PDCAT
2004
Springer
13 years 11 months ago
State Machine Based Operating System Architecture for Wireless Sensor Networks
A wireless sensor network is characterized as a massively distributed and deeply embedded system. Such a system requires concurrent and asynchronous event handling as a distributed...
Tae-Hyung Kim, Seongsoo Hong
SRDS
2000
IEEE
13 years 10 months ago
Abstractions for Devising Byzantine-Resilient State Machine Replication
Assia Doudou, Rachid Guerraoui, Benoît Garbi...