Sciweavers

1144 search results - page 65 / 229
» Protocol Implementation in a Vertically Structured Operating...
Sort
View
105
Voted
OSDI
2004
ACM
16 years 2 months ago
Secure Untrusted Data Repository (SUNDR)
SUNDR is a network file system designed to store data securely on untrusted servers. SUNDR lets clients detect any attempts at unauthorized file modification by malicious server o...
David Mazières, Dennis Shasha, Jinyuan Li, ...
CRW
1998
Springer
332views Robotics» more  CRW 1998»
15 years 6 months ago
Communication in Domains with Unreliable, Single-Channel, Low-Bandwidth Communication
In most multiagent systems with communicating agents, the agents have the luxury of using reliable, multi-step negotiation protocols. They can do so primarily when communication i...
Peter Stone, Manuela M. Veloso
128
Voted
CCS
2008
ACM
15 years 4 months ago
FairplayMP: a system for secure multi-party computation
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the great achievements of modern cryptograp...
Assaf Ben-David, Noam Nisan, Benny Pinkas
125
Voted
OSDI
2004
ACM
16 years 2 months ago
Chain Replication for Supporting High Throughput and Availability
Chain replication is a new approach to coordinating clusters of fail-stop storage servers. The approach is intended for supporting large-scale storage services that exhibit high t...
Robbert van Renesse, Fred B. Schneider
155
Voted
DSN
2011
IEEE
14 years 2 months ago
Transparent dynamic binding with fault-tolerant cache coherence protocol for chip multiprocessors
—Aggressive technology scaling causes chip multiprocessors increasingly error-prone. Core-level faulttolerant approaches bind two cores to implement redundant execution and error...
Shuchang Shan, Yu Hu, Xiaowei Li