Sciweavers

4184 search results - page 191 / 837
» Names of Our Lives
Sort
View
VLDB
2004
ACM
173views Database» more  VLDB 2004»
15 years 7 months ago
Enhancing P2P File-Sharing with an Internet-Scale Query Processor
In this paper, we address the problem of designing a scalable, accurate query processor for peerto-peer filesharing and similar distributed keyword search systems. Using a global...
Boon Thau Loo, Joseph M. Hellerstein, Ryan Huebsch...
CODES
2003
IEEE
15 years 7 months ago
Tracking object life cycle for leakage energy optimization
The focus of this work is on utilizing the state of objects during their lifespan in optimizing the leakage energy consumed in the data caches when executing embedded Java applica...
Guangyu Chen, Narayanan Vijaykrishnan, Mahmut T. K...
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
15 years 7 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
DANCE
2002
IEEE
15 years 6 months ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...
CONTENT
2001
Springer
15 years 6 months ago
Children's Creation of Shared 3D Worlds
The paper will describe research undertaken to investigate how children can be assisted to construct web based 3D worlds. As new technologies become an increasingly important part ...
Magnus Moar, Fiona Bailey