Sciweavers

329 search results - page 41 / 66
» The Dangers of Replication and a Solution
Sort
View
WMCSA
1999
IEEE
15 years 6 months ago
DataX: an Approach to Ubiquitous Database Access
This paper describes an approach for enabling remote database access from heterogeneous thin clients. DataX is a proxy-based architecture that supports disconnected operation by r...
Hui Lei, Marion Blount, Carl D. Tait
CCS
2006
ACM
15 years 5 months ago
Scalable group communication system for scalable trust
Programmers of large-scale trusted systems need tools to simplify tasks such as replicating services or data. Group communication systems achieve this via various flavors of relia...
Krzysztof Ostrowski, Kenneth P. Birman
DPD
2006
144views more  DPD 2006»
15 years 1 months ago
Integration of transient Web services into a virtual peer to peer Web service registry
Transient Web service provisioning implies a variety of different requirements that are hard to meet in traditional Web service environments. Currently, Web service brokerage focus...
Schahram Dustdar, Martin Treiber
TCAD
2008
112views more  TCAD 2008»
15 years 1 months ago
Exploiting Symmetries to Speed Up SAT-Based Boolean Matching for Logic Synthesis of FPGAs
Boolean matching is one of the enabling techniques for technology mapping and logic resynthesis of Field Programmable Gate Array (FPGA). SAT-based Boolean matching (SAT-BM) has bee...
Yu Hu, Victor Shih, Rupak Majumdar, Lei He
FGCS
2000
93views more  FGCS 2000»
15 years 1 months ago
Sharing objects in a distributed, single address space environment
With reference to an object type defining the two basic operations, read and write, we present solutions to the object sharing problem, classified according to the migration and/o...
Gianluca Dini, Lanfranco Lopriore