Sciweavers

329 search results - page 52 / 66
» The Dangers of Replication and a Solution
Sort
View
OTM
2007
Springer
15 years 5 months ago
Invasive Patterns for Distributed Programs
Software patterns have evolved into a commonly used means to design and implement software systems. Programming patterns, architecture and design patterns have been quite successfu...
Luis Daniel Benavides Navarro, Mario Südholt,...
HPDC
2006
IEEE
15 years 5 months ago
Filecules in High-Energy Physics: Characteristics and Impact on Resource Management
Grid computing has reached the stage where deployments are mature and many collaborations run in production mode. Mature Grid deployments offer the opportunity for revisiting and ...
Adriana Iamnitchi, Shyamala Doraimani, Gabriele Ga...
INTERSENSE
2006
ACM
15 years 5 months ago
Addressing network heterogeneity in pervasive application environments
— Pervasive computing applications typically involve rich interactions and heterogeneous network types; e.g. involving the collation of data from a sensor network into a replicat...
Paul Grace, Geoff Coulson, Gordon S. Blair, Barry ...
SAC
2006
ACM
15 years 5 months ago
Revisiting 1-copy equivalence in clustered databases
Recently renewed interest in scalable database systems for shared nothing clusters has been supported by replication protocols based on group communication that are aimed at seaml...
Rui Carlos Oliveira, José Pereira, Alfr&aci...
SBCCI
2006
ACM
124views VLSI» more  SBCCI 2006»
15 years 5 months ago
A cryptography core tolerant to DFA fault attacks
This work describes a hardware approach for the concurrent fault detection and error correction in a cryptographic core. It has been shown in the literature that transient faults ...
Carlos Roberto Moratelli, Érika F. Cota, Ma...