Sciweavers

2715 search results - page 420 / 543
» An Implementation of Narrowing Strategies
Sort
View
ACSAC
1999
IEEE
14 years 2 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
ICDCS
1999
IEEE
14 years 2 months ago
Design Considerations for Distributed Caching on the Internet
In this paper, we describe the design and implementation of an integrated architecture for cache systems that scale to hundreds or thousands of caches with thousands to millions o...
Renu Tewari, Michael Dahlin, Harrick M. Vin, Jonat...
IEEEPACT
1999
IEEE
14 years 2 months ago
Containers on the Parallelization of General-Purpose Java Programs
Automatic parallelization of general-purpose programs is still not possible in general in the presence of irregular data structures and complex control-flows. One promising strate...
Peng Wu, David A. Padua
WETICE
1999
IEEE
14 years 2 months ago
Collective Choice in Virtual Teams
Virtual organisations within and across enterprise structures are becoming mature as a potentially effective means for goal oriented business teamwork. Among the plentyful of supp...
Alois Ferscha, Christoph Scheiner
ICLP
1999
Springer
14 years 2 months ago
Comparing Trailing and Copying for Constraint Programming
A central service of a constraint programming system is search. In almost all constraint programming systems search is based on trailing, which is well understood and known to be ...
Christian Schulte