Sciweavers

5344 search results - page 278 / 1069
» Privacy-Preserving Set Operations
Sort
View
USENIX
1993
15 years 5 months ago
The Design and Implementation of the Inversion File System
This paper describes the design, implementation, and performance of the Inversion file system. Inversion provides a rich set of services to file system users, and manages a larg...
Michael A. Olson
122
Voted
USENIX
1993
15 years 5 months ago
Fremont: A System for Discovering Network Characteristics and Problems
In this paper we present an architecture and prototype implementation for discovering key network characteristics, such as hosts, gateways, and topology. The Fremont system uses a...
David C. M. Wood, Sean S. Coleman, Michael F. Schw...
USENIX
1990
15 years 5 months ago
The Evolution of Dbx
Dbx is the standard source-level debugger on most Unix1 workstations. Over the past six years Dbx has grown from a debugger for interpreted Pascal programs to a debugger for compi...
Mark A. Linton
CLEF
2010
Springer
15 years 5 months ago
Overview of the 1st International Competition on Wikipedia Vandalism Detection
This paper overviews 9 vandalism detectors that have been developed and evaluated within PAN'10. We start with a survey of 55 different kinds of features employed in the detec...
Martin Potthast, Benno Stein, Teresa Holfeld
CORR
2008
Springer
104views Education» more  CORR 2008»
15 years 4 months ago
Coalgebraic Automata Theory: Basic Results
Abstract. We generalize some of the central results in automata theory to the abstraction level of coalgebras and thus lay out the foundations of a universal theory of automata ope...
Clemens Kupke, Yde Venema