Sciweavers

647 search results - page 100 / 130
» About the Design of Distributed Control Systems: The Quasi-S...
Sort
View
ICS
2010
Tsinghua U.
16 years 1 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
ICPADS
2010
IEEE
15 years 2 months ago
Effective Performance Measurement at Petascale Using IPM
As supercomputers are being built from an ever increasing number of processing elements, the effort required to achieve a substantial fraction of the system peak performance is con...
Karl Fürlinger, Nicholas J. Wright, David Ski...
ICFP
2008
ACM
16 years 4 months ago
A functional model-view-controller software architecture for command-oriented programs
Command-oriented functional programs are currently structured in an ad hoc way that makes the development of multiple userinterfaces difficult and error prone, and makes it diffic...
Alley Stoughton
ICDE
2005
IEEE
95views Database» more  ICDE 2005»
16 years 5 months ago
SemCast: Semantic Multicast for Content-based Data Dissemination
We address the problem of content-based dissemination of highly-distributed, high-volume data streams for stream-based monitoring applications and large-scale data delivery. Exist...
Olga Papaemmanouil, Ugur Çetintemel
NOSSDAV
2004
Springer
15 years 9 months ago
A framework for architecting peer-to-peer receiver-driven overlays
This paper presents a simple and scalable framework for architecting peer-to-peer overlays called Peer-to-peer Receiverdriven Overlay (or PRO). PRO is designed for non-interactive...
Reza Rejaie, Shad Stafford