Sciweavers

430 search results - page 74 / 86
» Efficient Proving for Practical Distributed Access-Control S...
Sort
View
IPPS
2010
IEEE
14 years 9 months ago
Runtime checking of serializability in software transactional memory
Abstract--Ensuring the correctness of complex implementations of software transactional memory (STM) is a daunting task. Attempts have been made to formally verify STMs, but these ...
Arnab Sinha, Sharad Malik
CHI
2006
ACM
16 years 3 days ago
Because I carry my cell phone anyway: functional location-based reminder applications
Although they have potential, to date location-based information systems have not radically improved the way we interact with our surroundings. To study related issues, we develop...
Pamela J. Ludford, Dan Frankowski, Ken Reily, Kurt...
IPPS
2008
IEEE
15 years 6 months ago
Heterogenous dating service with application to rumor spreading
Peer-to-Peer overlay networks have proven their efficiency for storing and retrieving data at large scale, but new services are required to take the actual performances of resour...
Olivier Beaumont, Philippe Duchon, Miroslaw Korzen...
PODS
2012
ACM
297views Database» more  PODS 2012»
13 years 2 months ago
Query-based data pricing
Data is increasingly being bought and sold online, and Webbased marketplace services have emerged to facilitate these activities. However, current mechanisms for pricing data are ...
Paraschos Koutris, Prasang Upadhyaya, Magdalena Ba...
MOBIHOC
2008
ACM
15 years 11 months ago
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
Christian Scheideler, Andréa W. Richa, Paol...