Sciweavers

8243 search results - page 1542 / 1649
» Can We Manage Trust
Sort
View
EDBT
2010
ACM
188views Database» more  EDBT 2010»
14 years 6 days ago
DEDUCE: at the intersection of MapReduce and stream processing
MapReduce and stream processing are two emerging, but different, paradigms for analyzing, processing and making sense of large volumes of modern day data. While MapReduce offers t...
Vibhore Kumar, Henrique Andrade, Bugra Gedik, Kun-...
APLAS
2008
ACM
13 years 11 months ago
Abstraction of Clocks in Synchronous Data-Flow Systems
ion of Clocks in Synchronous Data-flow Systems Albert Cohen1 , Louis Mandel2 , Florence Plateau2 , and Marc Pouzet23 1 INRIA Saclay - Ile-de-France, Orsay, France 2 LRI, Univ. Pari...
Albert Cohen, Louis Mandel, Florence Plateau, Marc...
ASPLOS
2008
ACM
13 years 11 months ago
Archipelago: trading address space for reliability and security
Memory errors are a notorious source of security vulnerabilities that can lead to service interruptions, information leakage and unauthorized access. Because such errors are also ...
Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Ben...
ATAL
2006
Springer
13 years 11 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate
CF
2005
ACM
13 years 11 months ago
A case for a working-set-based memory hierarchy
Modern microprocessor designs continue to obtain impressive performance gains through increasing clock rates and advances in the parallelism obtained via micro-architecture design...
Steve Carr, Soner Önder
« Prev « First page 1542 / 1649 Last » Next »