Sciweavers

1833 search results - page 91 / 367
» Mechanized Verification with Sharing
Sort
View
123
Voted
HPCA
2008
IEEE
16 years 1 months ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...
90
Voted
ICCD
2006
IEEE
139views Hardware» more  ICCD 2006»
15 years 9 months ago
Perceptron Based Consumer Prediction in Shared-Memory Multiprocessors
Abstract— Recent research has shown that forwarding speculative data to other processors before it is requested can improve the performance of multiprocessor systems. The most re...
Sean Leventhal, Manoj Franklin
COLCOM
2008
IEEE
15 years 7 months ago
Access Control Model for Sharing Composite Electronic Health Records
The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of...
Jing Jin, Gail-Joon Ahn, Michael J. Covington, Xin...
125
Voted
ICC
2007
IEEE
175views Communications» more  ICC 2007»
15 years 7 months ago
A Framework for Dynamic Spectrum Sharing Between Cognitive Radios
— We consider a cognitive radio system like the future 802.22 networks where license-exempt service providers (SPs) will share a fixed spectrum in a non-interference basis to ea...
Joydeep Acharya, Roy D. Yates
109
Voted
ICDCS
2007
IEEE
15 years 7 months ago
An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System
Peer-to-peer networks often use incentive policies to encourage cooperation between nodes. Such systems are generally susceptible to collusion by groups of users in order to gain ...
Qiao Lian, Zheng Zhang, Mao Yang, Ben Y. Zhao, Yaf...