Sciweavers

5344 search results - page 288 / 1069
» Privacy-Preserving Set Operations
Sort
View
HOTOS
1997
IEEE
15 years 8 months ago
The Flux OS Toolkit: Reusable Components for OS Implementation
To an unappreciated degree, research both in operating systems andtheirprogramminglanguageshasbeen severely hampered by the lack of cleanly reusable code providing mundanelow-leve...
Bryan Ford, Kevin Van Maren, Jay Lepreau, Stephen ...
136
Voted
SCM
1998
15 years 5 months ago
PRCS: The Project Revision Control System
PRCS is an attempt to provide a version-control system for collections of les with a simple operational model, a clean user interface, and high performance. PRCS is characterized b...
Josh MacDonald, Paul N. Hilfinger, Luigi Semenzato
WSC
2000
15 years 5 months ago
Using simulation and critical points to define states in continuous search spaces
Many artificial intelligence techniques rely on the notion ate" as an abstraction of the actual state of the nd an "operator" as an abstraction of the actions that ...
Marc S. Atkin, Paul R. Cohen
CCS
2010
ACM
15 years 4 months ago
DIFC programs by automatic instrumentation
Decentralized information flow control (DIFC) operating systems provide applications with mechanisms for enforcing information-flow policies for their data. However, significant o...
William R. Harris, Somesh Jha, Thomas W. Reps
CCR
2002
97views more  CCR 2002»
15 years 4 months ago
Multi-modal network protocols
Most network protocols are uni-modal: they employ a single set of algorithms that allows them to cope well only within a narrow range of operating conditions. This rigid design re...
Rajesh Krishna Balan, Aditya Akella, Srinivasan Se...