Sciweavers

2375 search results - page 207 / 475
» From Remote Objects to Physically Distributed Objects
Sort
View
114
Voted
COLT
2007
Springer
15 years 10 months ago
Occam's Hammer
Abstract. We establish a generic theoretical tool to construct probabilistic bounds for algorithms where the output is a subset of objects from an initial pool of candidates (or mo...
Gilles Blanchard, François Fleuret
HICSS
2003
IEEE
99views Biometrics» more  HICSS 2003»
15 years 9 months ago
"Yeah, the Rush ain't here yet - Take a break": Creation and Use of an Artifact as Organizational Memory
In order to understand organizational memory, it is important to understand how things become adopted as memory resources in organizations. In this paper, we describe the genesis ...
Christine Halverson, Mark S. Ackerman
145
Voted
IOLTS
2000
IEEE
115views Hardware» more  IOLTS 2000»
15 years 8 months ago
Micro-Checkpointing: Checkpointing for Multithreaded Applications
In this paper, we introduce an efficient technique for checkpointing multithreaded applications. Our approach makes use of processes constructed around the ARMOR (Adaptive Reconfi...
Keith Whisnant, Zbigniew Kalbarczyk, Ravishankar K...
ECOOP
2000
Springer
15 years 8 months ago
Design Templates for Collective Behavior
Abstract. While sequential behavior of single objects is fairly well understood, orchestrating the collective behavior emerging from the behaviors of individual objects continues t...
Pertti Kellomäki, Tommi Mikkonen
CSE
2009
IEEE
15 years 10 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu