Sciweavers

1814 search results - page 283 / 363
» D-Stampede: Distributed Programming System for Ubiquitous Co...
Sort
View
129
Voted
ICALP
2003
Springer
15 years 8 months ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...
130
Voted
CDC
2010
IEEE
14 years 9 months ago
A hierarchical approach to energy management in data centers
This paper concerns the management of energy in data centers using a cyber-physical model that supports the coordinated control of both computational and thermal (cooling) resource...
Luca Parolini, Emanuele Garone, Bruno Sinopoli, Br...
156
Voted
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 5 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
112
Voted
PERCOM
2009
ACM
15 years 9 months ago
A Dynamic Platform for Runtime Adaptation
—We present a middleware platform for assembling pervasive applications that demand fault-tolerance and adaptivity in distributed, dynamic environments. Unlike typical adaptive m...
Hubert Pham, Justin Mazzola Paluska, Umar Saif, Ch...
132
Voted
EDO
2000
Springer
15 years 6 months ago
Component Metadata for Software Engineering Tasks
Abstract. This paper presents a framework that lets a component developer provide a component user with different kinds of information, depending on the specific context and needs....
Alessandro Orso, Mary Jean Harrold, David S. Rosen...