Sciweavers

3991 search results - page 682 / 799
» Bounding homogeneous models
Sort
View
ICPP
1998
IEEE
14 years 9 days ago
Improving Parallel-Disk Buffer Management using Randomized Writeback
We address the problems of I/O scheduling and buffer management for general reference strings in a parallel I/O system. Using the standard parallel disk model withD disks and a sh...
Mahesh Kallahalla, Peter J. Varman
ISCA
1998
IEEE
126views Hardware» more  ISCA 1998»
14 years 8 days ago
Switcherland: A QoS Communication Architecture for Workstation Clusters
Computer systems have become powerful enough to process continuous data streams such as video or animated graphics. While processing power and communication bandwidth of today...
Hans Eberle, Erwin Oertli
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
14 years 8 days ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
STOC
1998
ACM
135views Algorithms» more  STOC 1998»
14 years 8 days ago
Checking Polynomial Identities over any Field: Towards a Derandomization?
We present a Monte Carlo algorithm for testing multivariate polynomial identities over any field using fewer random bits than other methods. To test if a polynomial P(x1 ::: xn) ...
Daniel Lewin, Salil P. Vadhan
GIS
1998
ACM
14 years 8 days ago
Greedy Cuts: An Advancing Front Terrain Triangulation Algorithm
We apply an advancing front technique to the problem of simplification of dense digitized terrain models. While most simplification algorithms have been based on either incrementa...
Cláudio T. Silva, Joseph S. B. Mitchell