Sciweavers

1513 search results - page 15 / 303
» Fibonacci Correction Networks
Sort
View
SIGMOD
2009
ACM
139views Database» more  SIGMOD 2009»
16 years 2 months ago
Detecting and resolving unsound workflow views for correct provenance analysis
views abstract groups of tasks in a workflow into high level composite tasks, in order to reuse sub-workflows and facilitate provenance analysis. However, unless a view is careful...
Peng Sun, Ziyang Liu, Susan B. Davidson, Yi Chen
INTERNET
2008
150views more  INTERNET 2008»
15 years 1 months ago
Convenience Over Correctness
ion. First described in RFC 707,1 with implementation approaches and details later provided by Andrew Birrell and Bruce Nelson,2 RPC has influenced distributed systems research and...
Steve Vinoski
ESOP
2003
Springer
15 years 7 months ago
Requirements on the Execution of Kahn Process Networks
Kahn process networks (KPNs) are a programming paradigm suitable for streaming-based multimedia and signal-processing applications. We discuss the execution of KPNs, and the criter...
Marc Geilen, Twan Basten
EUROSYS
2006
ACM
15 years 5 months ago
Fireflies: scalable support for intrusion-tolerant network overlays
This paper describes and evaluates Fireflies, a scalable protocol for supporting intrusion-tolerant network overlays.1 While such a protocol cannot distinguish Byzantine nodes fro...
Håvard D. Johansen, André Allavena, R...
DATE
2008
IEEE
115views Hardware» more  DATE 2008»
15 years 8 months ago
Synthesizing Synchronous Elastic Flow Networks
This paper describes an implementation language and synthesis system for automatically generating latency insensitive synchronous digital designs. These designs decouple behaviora...
Greg Hoover, Forrest Brewer