Sciweavers

853 search results - page 81 / 171
» Delimited Continuations in Operating Systems
Sort
View
IACR
2011
86views more  IACR 2011»
13 years 9 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
SIGMOD
2009
ACM
140views Database» more  SIGMOD 2009»
15 years 10 months ago
Distributed data-parallel computing using a high-level programming language
The Dryad and DryadLINQ systems offer a new programming model for large scale data-parallel computing. They generalize previous execution environments such as SQL and MapReduce in...
Michael Isard, Yuan Yu
EDBT
2008
ACM
135views Database» more  EDBT 2008»
15 years 10 months ago
Minimizing latency and memory in DSMS: a unified approach to quasi-optimal scheduling
Data Stream Management Systems (DSMSs) must support optimized execution scheduling of multiple continuous queries on massive, and frequently bursty, data streams. Previous approac...
Yijian Bai, Carlo Zaniolo
IPPS
2007
IEEE
15 years 4 months ago
OS Mechanism for Continuation-based Fine-grained Threads on Dedicated and Commodity Processors
Fine-grained multithreading based on a natural model, such as dataflow model, is promising in achieving high efficiency and high programming productivity. In this paper, we disc...
Shigeru Kusakabe, Satoshi Yamada, Mitsuhiro Aono, ...
KI
1998
Springer
15 years 2 months ago
GOLEX - Bridging the Gap between Logic (GOLOG) and a Real Robot
The control of mobile robots acting autonomously in the real world is one of the long-term goals of the field of artificial intelligence. So far the field lacks methods bridging th...
Dirk Hähnel, Wolfram Burgard, Gerhard Lakemey...