Sciweavers

5790 search results - page 204 / 1158
» Distributed programming with distributed authorization
Sort
View
150
Voted
MDM
2005
Springer
165views Communications» more  MDM 2005»
15 years 8 months ago
STEP: Self-Tuning Energy-safe Predictors
Data access prediction has been proposed as a mechanism to overcome latency lag, and more recently as a means of conserving energy in mobile systems. We present a fully adaptive p...
James Larkby-Lahet, Ganesh Santhanakrishnan, Ahmed...
159
Voted
HPDC
2003
IEEE
15 years 8 months ago
Using Views for Customizing Reusable Components in Component-Based Frameworks
Increasingly, scalable distributed applications are being constructed by integrating reusable components spanning multiple administrative domains. Dynamic composition and deployme...
Anca-Andreea Ivan, Vijay Karamcheti
132
Voted
ICALP
2009
Springer
16 years 3 months ago
A Distributed and Oblivious Heap
This paper shows how to build and maintain a distributed heap which we call SHELL. In contrast to standard heaps, our heap is oblivious in the sense that its structure only depends...
Christian Scheideler, Stefan Schmid
121
Voted
ICRA
2007
IEEE
157views Robotics» more  ICRA 2007»
15 years 9 months ago
Distributed Watchpoints: Debugging Large Multi-Robot Systems
Abstract— Tightly-coupled multi-agent systems such as modular robots frequently exhibit properties of interest that span multiple modules. These properties cannot easily be detec...
Michael DeRosa, Jason Campbell, Padmanabhan Pillai...
BTW
2007
Springer
142views Database» more  BTW 2007»
15 years 9 months ago
Algebraic Query Optimization for Distributed Top-k Queries
: Distributed top-k query processing is increasingly becoming an essential functionality in a large number of emerging application classes. This paper addresses the efficient alge...
Thomas Neumann, Sebastian Michel