Sciweavers

5962 search results - page 1033 / 1193
» Working with Patterns and Code
Sort
View
WWW
2010
ACM
15 years 10 months ago
Object views: fine-grained sharing in browsers
Browsers do not currently support the secure sharing of JavaScript objects between principals. We present this problem as the need for object views, which are consistent and contr...
Leo A. Meyerovich, Adrienne Porter Felt, Mark S. M...
ICC
2009
IEEE
103views Communications» more  ICC 2009»
15 years 10 months ago
Optimization of Split-And-Combine Relaying
Relays play an important role for increasing rate and reducing energy consumption of wireless networks. In this paper we consider a three-node network (source, relay, destination)...
Raymond Yim, Andreas F. Molisch, Jinyun Zhang
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 10 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
TPHOL
2009
IEEE
15 years 10 months ago
A Better x86 Memory Model: x86-TSO
Abstract. Real multiprocessors do not provide the sequentially consistent memory that is assumed by most work on semantics and verification. Instead, they have relaxed memory mode...
Scott Owens, Susmit Sarkar, Peter Sewell
IMC
2009
ACM
15 years 10 months ago
The importance of being overheard: throughput gains in wireless mesh networks
A flurry of recent work has focused on the performance gains that may be achieved by leveraging the broadcast nature of the wireless channel. In particular, researchers have obse...
Mikhail Afanasyev, Alex C. Snoeren
« Prev « First page 1033 / 1193 Last » Next »