Sciweavers

1906 search results - page 200 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
STOC
2009
ACM
167views Algorithms» more  STOC 2009»
16 years 4 months ago
Universally utility-maximizing privacy mechanisms
A mechanism for releasing information about a statistical database with sensitive data must resolve a trade-off between utility and privacy. Publishing fully accurate information ...
Arpita Ghosh, Tim Roughgarden, Mukund Sundararajan
FGCS
2000
100views more  FGCS 2000»
15 years 3 months ago
Investigating the application of web-based simulation principles within the architecture for a next-generation computer generate
With a heavy emphasis on distribution and reuse, web-based simulation portends a dramatic shift in the application of simulation as a problem-solving technique and decision-suppor...
Ernest H. Page, Jeffrey M. Opper
CORR
2006
Springer
99views Education» more  CORR 2006»
15 years 4 months ago
Intermediate Performance of Rateless Codes
Abstract-- Fountain codes are designed so that all input symbols can be recovered from a slightly larger number of coded symbols, with high probability using an iterative decoder. ...
Sujay Sanghavi
CCGRID
2001
IEEE
15 years 7 months ago
Sabotage-Tolerance Mechanisms for Volunteer Computing Systems
In this paper, we address the new problem of protecting volunteer computing systems from malicious volunteers who submit erroneous results by presenting sabotagetolerance mechanis...
Luis F. G. Sarmenta
ISCA
2010
IEEE
219views Hardware» more  ISCA 2010»
15 years 9 months ago
Using hardware vulnerability factors to enhance AVF analysis
Fault tolerance is now a primary design constraint for all major microprocessors. One step in determining a processor’s compliance to its failure rate target is measuring the Ar...
Vilas Sridharan, David R. Kaeli