Sciweavers

1833 search results - page 63 / 367
» Mechanized Verification with Sharing
Sort
View
AINA
2005
IEEE
15 years 6 months ago
Efficient Secret Sharing with Access Structures in a Hierarchy
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
Chu-Hsing Lin, Wei Lee
95
Voted
EMSOFT
2003
Springer
15 years 6 months ago
HOKES/POKES: Light-Weight Resource Sharing
Abstract. In this paper, we explain mechanisms for providing embedded network processors and other low-level programming environments with light-weight support for safe resource sh...
Herbert Bos, Bart Samwel
121
Voted
TIC
2000
Springer
116views System Software» more  TIC 2000»
15 years 4 months ago
Sharing in Typed Module Assembly Language
Abstract. There is a growing need to provide low-overhead softwarebased protection mechanisms to protect against malicious or untrusted code. Type-based approaches such as proof-ca...
Dominic Duggan
IPPS
2003
IEEE
15 years 6 months ago
Application/Kernel Cooperation Towards the Efficient Execution of Shared-Memory Parallel Java Codes
In this paper we propose mechanisms to improve the performance of parallel Java applications executing on multiprogrammed shared-memory multiprocessors. The proposal is based on a...
Jordi Guitart, Xavier Martorell, Jordi Torres, Edu...
106
Voted
JSSPP
2010
Springer
14 years 10 months ago
Dynamic Proportional Share Scheduling in Hadoop
We present the Dynamic Priority (DP) parallel task scheduler for Hadoop. It allows users to control their allocated capacity by adjusting their spending over time. This simple mech...
Thomas Sandholm, Kevin Lai