Sciweavers

5090 search results - page 1001 / 1018
» Constructing Strategies for Programming
Sort
View
CRYPTO
2001
Springer
152views Cryptology» more  CRYPTO 2001»
14 years 5 days ago
Secure Distributed Linear Algebra in a Constant Number of Rounds
Consider a network of processors among which elements in a finite field K can be verifiably shared in a constant number of rounds. Assume furthermore constant-round protocols ar...
Ronald Cramer, Ivan Damgård
HPDC
2000
IEEE
14 years 2 days ago
Creating Large Scale Database Servers
The BaBar experiment at the Stanford Linear Accelerator Center (SLAC) is designed to perform a high precision investigation of the decays of the B-meson produced from electron-pos...
Jacek Becla, Andrew Hanushevsky
MSS
2000
IEEE
113views Hardware» more  MSS 2000»
14 years 1 days ago
Jiro Storage Management
The Jiro™ technology provides an environment intended for the implementation of storage management solutions. A product based on Jiro technology is an implementation based on th...
Bruce K. Haddon, William H. Connor
MSS
1999
IEEE
118views Hardware» more  MSS 1999»
13 years 12 months ago
Designing a Self-Maintaining Storage System
This paper shows the suitability of a "self-maintaining" approach to Tertiary Disk, a large-scale disk array system built from commodity components. Instead of incurring...
Satoshi Asami, Nisha Talagala, David A. Patterson
FQAS
1998
Springer
118views Database» more  FQAS 1998»
13 years 12 months ago
Partial Answers for Unavailable Data Sources
Abstract. Many heterogeneous database system products and prototypes exist today; they will soon be deployed in a wide variety of environments. Most existing systems suffer from an...
Philippe Bonnet, Anthony Tomasic
« Prev « First page 1001 / 1018 Last » Next »