Sciweavers

4044 search results - page 461 / 809
» The Evolution of a Distributed Operating System
Sort
View
CODASPY
2012
14 years 10 days ago
Identifying native applications with high assurance
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
Hussain M. J. Almohri, Danfeng (Daphne) Yao, Denni...
153
Voted
SOSP
2003
ACM
16 years 1 months ago
Upgrading transport protocols using untrusted mobile code
In this paper, we present STP, a system in which communicating end hosts use untrusted mobile code to remotely upgrade each other with the transport protocols that they use to com...
Parveen Patel, Andrew Whitaker, David Wetherall, J...
135
Voted
ICPP
1999
IEEE
15 years 9 months ago
An Offline Algorithm for Dimension-Bound Analysis
The vector-clock size necessary to characterize causality in a distributed computation is bounded by the dimension of the partial order induced by that computation. In an arbitrar...
Paul A. S. Ward
119
Voted
IPPS
2009
IEEE
15 years 11 months ago
Robust CDN replica placement techniques
—Creating replicas of frequently accessed data objects across a read-intensive Content Delivery Network (CDN) can result in reduced user response time. Because CDNs often operate...
Samee Ullah Khan, Anthony A. Maciejewski, Howard J...
150
Voted
CONCUR
2009
Springer
15 years 11 months ago
HYPE: A Process Algebra for Compositional Flows and Emergent Behaviour
Several process algebras for modelling hybrid systems have appeared in the literature in recent years. These all assume that continuous variables in the system are modelled monolit...
Vashti Galpin, Luca Bortolussi, Jane Hillston