Sciweavers

21876 search results - page 4205 / 4376
» Computer game-flow design
Sort
View
118
Voted
ICCAD
2002
IEEE
161views Hardware» more  ICCAD 2002»
16 years 15 days ago
Non-tree routing for reliability and yield improvement
We propose to introduce redundant interconnects for manufacturing yield and reliability improvement. By introducing redundant interconnects, the potential for open faults is reduc...
Andrew B. Kahng, Bao Liu, Ion I. Mandoiu
123
Voted
SOSP
2003
ACM
16 years 15 days ago
Samsara: honor among thieves in peer-to-peer storage
Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement m...
Landon P. Cox, Brian D. Noble
118
Voted
SOSP
2005
ACM
16 years 15 days ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
SOSP
2009
ACM
16 years 15 days ago
Debugging in the (very) large: ten years of implementation and experience
Windows Error Reporting (WER) is a distributed system that automates the processing of error reports coming from an installed base of a billion machines. WER has collected billion...
Kirk Glerum, Kinshuman Kinshumann, Steve Greenberg...
TLDI
2010
ACM
190views Formal Methods» more  TLDI 2010»
16 years 15 days ago
Distributed programming with distributed authorization
We propose a programming language, called PCML5, for building distributed applications with distributed access control. Target applications include web-based systems in which prog...
Kumar Avijit, Anupam Datta, Robert Harper
« Prev « First page 4205 / 4376 Last » Next »