Sciweavers

18924 search results - page 3660 / 3785
» Conformance of Distributed Systems
Sort
View
INFOCOM
2009
IEEE
15 years 9 months ago
Fighting Spam with the NeighborhoodWatch DHT
—In this paper, we present DHTBL, an anti-spam blacklist built upon a novel secure distributed hash table (DHT). We show how DHTBL can be used to replace existing DNS-based black...
Adam Bender, Rob Sherwood, Derek Monner, Nathan Go...
112
Voted
ISCA
2009
IEEE
137views Hardware» more  ISCA 2009»
15 years 9 months ago
A case for an interleaving constrained shared-memory multi-processor
Shared-memory multi-threaded programming is inherently more difficult than single-threaded programming. The main source of complexity is that, the threads of an application can in...
Jie Yu, Satish Narayanasamy
116
Voted
ISCA
2009
IEEE
146views Hardware» more  ISCA 2009»
15 years 9 months ago
Multi-execution: multicore caching for data-similar executions
While microprocessor designers turn to multicore architectures to sustain performance expectations, the dramatic increase in parallelism of such architectures will put substantial...
Susmit Biswas, Diana Franklin, Alan Savage, Ryan D...
111
Voted
MICRO
2009
IEEE
144views Hardware» more  MICRO 2009»
15 years 9 months ago
Characterizing flash memory: anomalies, observations, and applications
Despite flash memory’s promise, it suffers from many idiosyncrasies such as limited durability, data integrity problems, and asymmetry in operation granularity. As architects, ...
Laura M. Grupp, Adrian M. Caulfield, Joel Coburn, ...
127
Voted
MICRO
2009
IEEE
148views Hardware» more  MICRO 2009»
15 years 9 months ago
Flip-N-Write: a simple deterministic technique to improve PRAM write performance, energy and endurance
The phase-change random access memory (PRAM) technology is fast maturing to production levels. Main advantages of PRAM are non-volatility, byte addressability, in-place programmab...
Sangyeun Cho, Hyunjin Lee
« Prev « First page 3660 / 3785 Last » Next »