Sciweavers

94 search results - page 15 / 19
» Can I Add a Secure VoIP Call
Sort
View
CCS
2005
ACM
14 years 1 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov
MICRO
2005
IEEE
136views Hardware» more  MICRO 2005»
14 years 1 months ago
Automatic Thread Extraction with Decoupled Software Pipelining
Until recently, a steadily rising clock rate and other uniprocessor microarchitectural improvements could be relied upon to consistently deliver increasing performance for a wide ...
Guilherme Ottoni, Ram Rangan, Adam Stoler, David I...
CRIWG
2004
13 years 9 months ago
A Decoupled Architecture for Action-Oriented Coordination and Awareness Management in CSCL/W Frameworks
This paper introduces AORTA, a software architecture that provides object-level coordination and shared workspace awareness support to synchronous and distributed collaborative app...
Pablo Orozco, Juan I. Asensio-Pérez, Pedro ...
SIGOPS
2008
306views more  SIGOPS 2008»
13 years 7 months ago
virtio: towards a de-facto standard for virtual I/O devices
The Linux Kernel currently supports at least 8 distinct virtualization systems: Xen, KVM, VMware's VMI, IBM's System p, IBM's System z, User Mode Linux, lguest and ...
Rusty Russell
OOPSLA
2007
Springer
14 years 1 months ago
Microphase: an approach to proactively invoking garbage collection for improved performance
To date, the most commonly used criterion for invoking garbage collection (GC) is based on heap usage; that is garbage collection is invoked when the heap or an area inside the he...
Feng Xian, Witawas Srisa-an, Hong Jiang