Sciweavers

36887 search results - page 83 / 7378
» Are We All In the Same
Sort
View
DSN
2008
IEEE
14 years 3 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
ICS
2010
Tsinghua U.
14 years 6 months ago
Cache Replacement Policies for Multicore Processors
Almost all of the modern computers use multiple cores, and the number of cores is expected to increase as hardware prices go down, and Moore's law fails to hold. Most of the ...
Avinatan Hassidim
VLDB
1991
ACM
81views Database» more  VLDB 1991»
14 years 25 days ago
On Maintaining Priorities in a Production Rule System
We present a priority system which is particularly suited for production rules coupled to databases. In this system, there are default priorities between all rules and overriding ...
Rakesh Agrawal, Roberta Cochrane, Bruce G. Lindsay
IPL
2010
112views more  IPL 2010»
13 years 7 months ago
The cost of probabilistic agreement in oblivious robot networks
In this paper, we look at the time complexity of two agreement problems in networks of oblivious mobile robots, namely, at the gathering and scattering problems. Given a set of ro...
Julien Clement, Xavier Défago, Maria Gradin...
ADCM
2006
101views more  ADCM 2006»
13 years 9 months ago
A general construction of barycentric coordinates over convex polygons
Barycentric coordinates are unique for triangles, but there are many possible generalizations to convex polygons. In this paper we derive sharp upper and lower bounds on all baryc...
Michael S. Floater, Kai Hormann, Géza K&oac...