Sciweavers

1611 search results - page 296 / 323
» A Library for Self-Adjusting Computation
Sort
View
NSDI
2008
15 years 2 months ago
BFT Protocols Under Fire
Much recent work on Byzantine state machine replication focuses on protocols with improved performance under benign conditions (LANs, homogeneous replicas, limited crash faults), ...
Atul Singh, Tathagata Das, Petros Maniatis, Peter ...
GLVLSI
2010
IEEE
190views VLSI» more  GLVLSI 2010»
15 years 1 months ago
A linear statistical analysis for full-chip leakage power with spatial correlation
In this paper, we present an approved linear-time algorithm for statistical leakage analysis in the present of any spatial correlation condition (strong or weak). The new algorith...
Ruijing Shen, Sheldon X.-D. Tan, Jinjun Xiong
CCS
2008
ACM
15 years 1 months ago
Online subscriptions with anonymous access
Online privacy is an increasingly important problem, as many services are now offered in a digital form. Privacy (or the lack thereof) is of a special concern in subscriptions to ...
Marina Blanton
DAC
2005
ACM
15 years 1 months ago
Design methodology for IC manufacturability based on regular logic-bricks
Implementing logic blocks in an integrated circuit in terms of repeating or regular geometry patterns [6,7] can provide significant advantages in terms of manufacturability and de...
V. Kheterpal, V. Rovner, T. G. Hersan, D. Motiani,...
NSDI
2010
15 years 1 months ago
Centrifuge: Integrated Lease Management and Partitioning for Cloud Services
: Making cloud services responsive is critical to providing a compelling user experience. Many largescale sites, including LinkedIn, Digg and Facebook, address this need by deployi...
Atul Adya, John Dunagan, Alec Wolman