Sciweavers

15727 search results - page 2824 / 3146
» Software Engineering - Introduction
Sort
View
EUROSYS
2011
ACM
14 years 8 months ago
DepSky: dependable and secure storage in a cloud-of-clouds
The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databa...
Alysson Neves Bessani, Miguel P. Correia, Bruno Qu...
EUROSYS
2011
ACM
14 years 8 months ago
CloneCloud: elastic execution between mobile device and cloud
Mobile applications are becoming increasingly ubiquitous and provide ever richer functionality on mobile devices. At the same time, such devices often enjoy strong connectivity wi...
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, May...
EUROSYS
2011
ACM
14 years 8 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
EUROSYS
2011
ACM
14 years 8 months ago
Is co-scheduling too expensive for SMP VMs?
Symmetric multiprocessing (SMP) virtual machines (VMs) allow users to take advantage of a multiprocessor infrastructure. Despite the advantage, SMP VMs can cause synchronization l...
Orathai Sukwong, Hyong S. Kim
FOSSACS
2011
Springer
14 years 8 months ago
Minimizing Deterministic Lattice Automata
Traditional automata accept or reject their input, and are therefore Boolean. In contrast, weighted automata map each word to a value from a semiring over a large domain. The speci...
Shulamit Halamish, Orna Kupferman
« Prev « First page 2824 / 3146 Last » Next »