Sciweavers

2465 search results - page 418 / 493
» An Adaptive Distributed System Based on Conditional Dependen...
Sort
View
117
Voted
ACSAC
2009
IEEE
15 years 4 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
97
Voted
ICDE
2007
IEEE
135views Database» more  ICDE 2007»
15 years 7 months ago
Cost-Aware Skyline Queries in Structured Overlays
Recently, systems providing access to extremely large data collections, managed in a distributed manner, gain emerging attention. A promising approach to implement the physical la...
Marcel Karnstedt, Jessica Müller, Kai-Uwe Sat...
105
Voted
USS
2008
15 years 2 months ago
On Auditing Elections When Precincts Have Different Sizes
We address the problem of auditing an election when precincts may have different sizes. Prior work in this field has emphasized the simpler case when all precincts have the same s...
Javed A. Aslam, Raluca A. Popa, Ronald L. Rivest
89
Voted
ICS
2003
Tsinghua U.
15 years 5 months ago
Estimating cache misses and locality using stack distances
Cache behavior modeling is an important part of modern optimizing compilers. In this paper we present a method to estimate the number of cache misses, at compile time, using a mac...
Calin Cascaval, David A. Padua
107
Voted
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
15 years 4 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar