Sciweavers

10819 search results - page 2064 / 2164
» Addition and multiplication of sets
Sort
View
ASPLOS
2006
ACM
14 years 4 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
CSCW
2006
ACM
14 years 4 months ago
Response times in N-user replicated, centralized, and proximity-based hybrid collaboration architectures
We evaluate response times, in N-user collaborations, of the popular centralized (client-server) and replicated (peer-to-peer) architectures, and a hybrid architecture in which ea...
Sasa Junuzovic, Prasun Dewan
STOC
2006
ACM
121views Algorithms» more  STOC 2006»
14 years 4 months ago
On adequate performance measures for paging
Memory management is a fundamental problem in computer architecture and operating systems. We consider a two-level memory system with fast, but small cache and slow, but large mai...
Konstantinos Panagiotou, Alexander Souza
DSN
2005
IEEE
14 years 3 months ago
A Model of Stateful Firewalls and Its Properties
We propose the first model of stateful firewalls. In this model, each stateful firewall has a variable set called the state of the firewall, which is used to store some packet...
Mohamed G. Gouda, Alex X. Liu
ICDCS
2005
IEEE
14 years 3 months ago
The Impossibility of Boosting Distributed Service Resilience
We prove two theorems saying that no distributed system in which processes coordinate using reliable registers and -resilient services can solve the consensus problem in the prese...
Paul C. Attie, Rachid Guerraoui, Petr Kouznetsov, ...
« Prev « First page 2064 / 2164 Last » Next »