Sciweavers

94 search results - page 15 / 19
» Can I Add a Secure VoIP Call
Sort
View
128
Voted
CCS
2005
ACM
15 years 10 months ago
Obfuscated databases and group privacy
We investigate whether it is possible to encrypt a database and then give it away in such a form that users can still access it, but only in a restricted way. In contrast to conve...
Arvind Narayanan, Vitaly Shmatikov
MICRO
2005
IEEE
136views Hardware» more  MICRO 2005»
15 years 10 months ago
Automatic Thread Extraction with Decoupled Software Pipelining
Until recently, a steadily rising clock rate and other uniprocessor microarchitectural improvements could be relied upon to consistently deliver increasing performance for a wide ...
Guilherme Ottoni, Ram Rangan, Adam Stoler, David I...
143
Voted
CRIWG
2004
15 years 6 months ago
A Decoupled Architecture for Action-Oriented Coordination and Awareness Management in CSCL/W Frameworks
This paper introduces AORTA, a software architecture that provides object-level coordination and shared workspace awareness support to synchronous and distributed collaborative app...
Pablo Orozco, Juan I. Asensio-Pérez, Pedro ...
SIGOPS
2008
306views more  SIGOPS 2008»
15 years 4 months ago
virtio: towards a de-facto standard for virtual I/O devices
The Linux Kernel currently supports at least 8 distinct virtualization systems: Xen, KVM, VMware's VMI, IBM's System p, IBM's System z, User Mode Linux, lguest and ...
Rusty Russell
OOPSLA
2007
Springer
15 years 10 months ago
Microphase: an approach to proactively invoking garbage collection for improved performance
To date, the most commonly used criterion for invoking garbage collection (GC) is based on heap usage; that is garbage collection is invoked when the heap or an area inside the he...
Feng Xian, Witawas Srisa-an, Hong Jiang