Sciweavers

2779 search results - page 492 / 556
» Modelling Immunological Memory
Sort
View
ESORICS
2010
Springer
15 years 1 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
HPDC
2010
IEEE
15 years 1 months ago
Fast and scalable simulation of volunteer computing systems using SimGrid
Advances in internetworking technology and the decreasing cost-performance ratio of commodity computing components have enabled Volunteer Computing (VC). VC platforms aggregate te...
Bruno Donassolo, Henri Casanova, Arnaud Legrand, P...
105
Voted
HPDC
2010
IEEE
15 years 1 months ago
New caching techniques for web search engines
This paper proposes a cache hierarchy that enables Web search engines to efficiently process user queries. The different caches in the hierarchy are used to store pieces of data w...
Mauricio Marín, Veronica Gil Costa, Carlos ...
116
Voted
PODC
2010
ACM
15 years 27 days ago
The k-bakery: local-spin k-exclusion using non-atomic reads and writes
Mutual exclusion is used to coordinate access to shared resources by concurrent processes. k-Exclusion is a variant of mutual exclusion in which up to k processes can simultaneous...
Robert Danek
79
Voted
AAI
2008
93views more  AAI 2008»
15 years 25 days ago
Adaptive Machine Learning in Delayed Feedback Domains by Selective Relearning
We present a novel hybrid technique for improving the predictive performance of an online Machine Learning system: Combining advantages from both memory based and concept based pr...
Marcus-Christopher Ludl, Achim Lewandowski, Georg ...