Sciweavers

1192 search results - page 80 / 239
» Computing Weakest Readings
Sort
View
COORDINATION
2005
Springer
15 years 9 months ago
Tagged Sets: A Secure and Transparent Coordination Medium
Abstract. A simple and effective way of coordinating distributed, mobile, and parallel applications is to use a virtual shared memory (VSM), such as a Linda tuple-space. In this p...
Manuel Oriol, Michael W. Hicks
FCT
2005
Springer
15 years 9 months ago
The Complexity of Querying External Memory and Streaming Data
We review a recently introduced computation model for streaming and external memory data. An important feature of this model is that it distinguishes between sequentially reading (...
Martin Grohe, Christoph Koch, Nicole Schweikardt
SC
2004
ACM
15 years 8 months ago
Dynamic Metadata Management for Petabyte-Scale File Systems
In petabyte-scale distributed file systems that decouple read and write from metadata operations, behavior of the metadata server cluster will be critical to overall system perfo...
Sage A. Weil, Kristal T. Pollack, Scott A. Brandt,...
109
Voted
SPIN
1999
Springer
15 years 7 months ago
Events in Property Patterns
A pattern-based approach to the presentation, codification and reuse of property specifications for finite-state verification was proposed by Dwyer and his colleagues in [4, 3]...
Marsha Chechik, Dimitrie O. Paun
109
Voted
FOCS
1992
IEEE
15 years 7 months ago
Probabilistic Checking of Proofs; A New Characterization of NP
We give a new characterization of NP: the class NP contains exactly those languages L for which membership proofs (a proof that an input x is in L) can be verified probabilisticall...
Sanjeev Arora, Shmuel Safra