Sciweavers

1134 search results - page 191 / 227
» Distributed Proving in Access-Control Systems
Sort
View
SIGCSE
2008
ACM
211views Education» more  SIGCSE 2008»
14 years 11 months ago
Cluster computing for web-scale data processing
In this paper we present the design of a modern course in cluster computing and large-scale data processing. The defining differences between this and previously published designs...
Aaron Kimball, Sierra Michels-Slettvet, Christophe...
TPDS
2008
88views more  TPDS 2008»
14 years 11 months ago
A Two-Hop Solution to Solving Topology Mismatch
The efficiency of Peer-to-Peer (P2P) systems is largely dependent on the overlay constructions. Due to the random selection of logical neighbors, there often exists serious topolog...
Yunhao Liu
JFP
2010
142views more  JFP 2010»
14 years 10 months ago
Linear type theory for asynchronous session types
Session types support a type-theoretic formulation of structured patterns of communication, so that the communication behaviour of agents in a distributed system can be verified ...
Simon J. Gay, Vasco Thudichum Vasconcelos
QUESTA
2010
131views more  QUESTA 2010»
14 years 10 months ago
Asymptotically optimal parallel resource assignment with interference
Motivated by scheduling in cellular wireless networks and resource allocation in computer systems, we study a service facility with two classes of users having heterogeneous servi...
Maaike Verloop, R. Núñez Queija
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
14 years 9 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer