Sciweavers

3052 search results - page 58 / 611
» Weakly Distributive Domains
Sort
View
PERCOM
2005
ACM
15 years 9 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
FAST
2004
14 years 11 months ago
Integrating Portable and Distributed Storage
We describe a technique called lookaside caching that combines the strengths of distributed file systems and portable storage devices, while negating their weaknesses. In spite of...
Niraj Tolia, Jan Harkes, Michael Kozuch, Mahadev S...
PDPTA
1996
14 years 11 months ago
A Taxonomy of Distributed Debuggers Based on Execution Replay
This paper presents a taxonomy of parallel and distributed debuggers based on execution replay. Programming of distributed and parallel systems is a complex task. Amongst the many...
Carl Dionne, Marc Feeley, Jocelyn Desbien
ICSM
2007
IEEE
15 years 4 months ago
NOREX: A Distributed Reengineering Environment
Several reengineering environments have been created to provide for a unified infrastructure in which various approaches can be employed together. While the collaboration between...
Mihai Balint, Petru Florin Mihancea, Tudor Gî...
VLDB
2005
ACM
135views Database» more  VLDB 2005»
15 years 3 months ago
Distributed Privacy Preserving Information Sharing
In this paper, we address issues related to sharing information in a distributed system consisting of autonomous entities, each of which holds a private database. Semi-honest beha...
Nan Zhang 0004, Wei Zhao