Sciweavers

6432 search results - page 1196 / 1287
» Classic Mechanism Design
Sort
View
114
Voted
CADE
2007
Springer
16 years 28 days ago
Solving Quantified Verification Conditions Using Satisfiability Modulo Theories
Abstract. First order logic provides a convenient formalism for describing a wide variety of verification conditions. Two main approaches to checking such conditions are pure first...
Yeting Ge, Clark Barrett, Cesare Tinelli
98
Voted
OSDI
2008
ACM
16 years 27 days ago
Delivering Energy Proportionality with Non Energy-Proportional Systems - Optimizing the Ensemble
: ? Delivering Energy Proportionality with Non Energy-Proportional Systems-Optimizing the Ensemble Niraj Tolia, Zhikui Wang, Manish Marwah, Cullen Bash, Parthasarathy Ranganathan, ...
Niraj Tolia, Zhikui Wang, Manish Marwah, Cullen Ba...
103
Voted
OSDI
2008
ACM
16 years 27 days ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
202
Voted
VLDB
2007
ACM
128views Database» more  VLDB 2007»
16 years 25 days ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
193
Voted
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
16 years 25 days ago
Asynchronous view maintenance for VLSD databases
The query models of the recent generation of very large scale distributed (VLSD) shared-nothing data storage systems, including our own PNUTS and others (e.g. BigTable, Dynamo, Ca...
Parag Agrawal, Adam Silberstein, Brian F. Cooper, ...
« Prev « First page 1196 / 1287 Last » Next »