Sciweavers

24529 search results - page 398 / 4906
» Computing on Authenticated Data
Sort
View
ICDCS
2008
IEEE
15 years 11 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...
ICIP
2008
IEEE
15 years 11 months ago
Localized and computationally efficient approach to shift-variant image deblurring
A new localized and computationally efficient approach is presented for shift/space-variant image restoration. Unlike conventional approaches, it models shift-variant blurring in...
Murali Subbarao, Youn-sik Kang, Satyaki Dutta, Xue...
VLDB
2005
ACM
117views Database» more  VLDB 2005»
15 years 10 months ago
Parallel Querying with Non-Dedicated Computers
We present DITN, a new method of parallel querying based on dynamic outsourcing of join processing tasks to non-dedicated, heterogeneous computers. In DITN, partitioning is not th...
Vijayshankar Raman, Wei Han, Inderpal Narang
ISSTA
1998
ACM
15 years 9 months ago
Computation of Interprocedural Control Dependence
Program dependence information is useful for a variety of software testing and maintenance tasks. Properly defined, control and data dependencies can be used to identify semantic...
Mary Jean Harrold, Gregg Rothermel, Saurabh Sinha
DEXA
1998
Springer
90views Database» more  DEXA 1998»
15 years 9 months ago
On the Correctness of a Transaction Model for Mobile Computing
We discuss and prove the correctness of a transaction model for mobile computing. In our transaction model, we incorporate a prewrite operation (before a write) which does not upda...
Sanjay Kumar Madria, Bharat K. Bhargava