Sciweavers

15635 search results - page 3056 / 3127
» A Designing Model of XML-Dataweb
Sort
View
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
13 years 11 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
SPDP
1993
IEEE
13 years 11 months ago
How to Share an Object: A Fast Timing-Based Solution
We consider the problem of transforming a given sequential implementation of a data structure into a wait-free concurrent implementation. Given the code for different operations ...
Rajeev Alur, Gadi Taubenfeld
ASPLOS
1992
ACM
13 years 11 months ago
Parity Declustering for Continuous Operation in Redundant Disk Arrays
We describe and evaluate a strategy for declustering the parity encoding in a redundant disk array. This declustered parity organization balances cost against data reliability and...
Mark Holland, Garth A. Gibson
PODC
1994
ACM
13 years 11 months ago
Using Belief to Reason about Cache Coherence
The notion of belief has been useful in reasoning about authentication protocols. In this paper, we show how the notion of belief can be applied to reasoning about cache coherence...
Lily B. Mummert, Jeannette M. Wing, Mahadev Satyan...
UIST
1993
ACM
13 years 11 months ago
A Framework for Shared Applications with a Replicated Architecture
n support in a user interface toolkit: flexible, robust, and reusable abstractions SE Hudson, JT Stasko - 1993 - ACM Press New York, NY, USA 62 1992: Two-handed gesture in multi-mo...
Thomas Berlage, Andreas Genau
« Prev « First page 3056 / 3127 Last » Next »