Sciweavers

24529 search results - page 4679 / 4906
» Computing on Authenticated Data
Sort
View
ICDCS
1995
IEEE
15 years 7 months ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere
128
Voted
SPAA
1997
ACM
15 years 7 months ago
Efficient Detection of Determinacy Races in Cilk Programs
A parallel multithreaded program that is ostensibly deterministic may nevertheless behave nondeterministically due to bugs in the code. These bugs are called determinacy races, an...
Mingdong Feng, Charles E. Leiserson
SC
1995
ACM
15 years 7 months ago
Architectural Mechanisms for Explicit Communication in Shared Memory Multiprocessors
The goal of this work is to explore architectural mechanisms for supporting explicit communication in cachecoherent shared memory multiprocessors. The motivation stems from the ob...
Umakishore Ramachandran, Gautam Shah, Anand Sivasu...
UIST
1995
ACM
15 years 7 months ago
Visual Interfaces for Solids Modeling
This paper exploresthe useof visualoperatorsfor solidsmodeling. We focus on designing interfaces for free-form operators such as blends, sweeps, and deformations, because these op...
Cindy Grimm, David Pugmire
ASPLOS
2010
ACM
15 years 7 months ago
Orthrus: efficient software integrity protection on multi-cores
This paper proposes an efficient hardware/software system that significantly enhances software security through diversified replication on multi-cores. Recent studies show that a ...
Ruirui Huang, Daniel Y. Deng, G. Edward Suh
« Prev « First page 4679 / 4906 Last » Next »