Sciweavers

3141 search results - page 528 / 629
» Computing the performability of layered distributed systems ...
Sort
View
ISW
2009
Springer
14 years 3 months ago
MAC Precomputation with Applications to Secure Memory
We present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, Sh...
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
SAC
2006
ACM
14 years 3 months ago
Revisiting 1-copy equivalence in clustered databases
Recently renewed interest in scalable database systems for shared nothing clusters has been supported by replication protocols based on group communication that are aimed at seaml...
Rui Carlos Oliveira, José Pereira, Alfr&aci...
SPAA
2010
ACM
14 years 1 months ago
Lightweight, robust adaptivity for software transactional memory
When a program uses Software Transactional Memory (STM) to synchronize accesses to shared memory, the performance often depends on which STM implementation is used. Implementation...
Michael F. Spear
CORR
2000
Springer
84views Education» more  CORR 2000»
13 years 9 months ago
Robust Classification for Imprecise Environments
In real-world environments it usually is difficult to specify target operating conditions precisely, for example, target misclassification costs. This uncertainty makes building ro...
Foster J. Provost, Tom Fawcett
IPPS
2009
IEEE
14 years 3 months ago
Input-independent, scalable and fast string matching on the Cray XMT
String searching is at the core of many security and network applications like search engines, intrusion detection systems, virus scanners and spam filters. The growing size of o...
Oreste Villa, Daniel G. Chavarría-Miranda, ...