Sciweavers

1635 search results - page 172 / 327
» DIPC: A System Software Solution for Distributed Programming
Sort
View
108
Voted
P2P
2009
IEEE
15 years 9 months ago
A Trusted Infrastructure for P2P-based Marketplaces
Peer-to-peer (P2P) based marketplaces have a number of advantages over traditional centralized systems (such as eBay). Peers form a distributed hash table and store sale offers fo...
Tien Tuan Anh Dinh, Tom Chothia, Mark Ryan
104
Voted
IPPS
2010
IEEE
15 years 16 days ago
Optimizing RAID for long term data archives
We present new methods to extend data reliability of disks in RAID systems for applications like long term data archival. The proposed solutions extend existing algorithms to detec...
Henning Klein, Jörg Keller
123
Voted
ICALP
1992
Springer
15 years 6 months ago
Near-perfect Token Distribution
Suppose that n tokens are arbitrarily placed on the n nodes of a graph. At each parallel step one token may be moved from each node to an adjacent node. An algorithm for the near-...
Andrei Z. Broder, Alan M. Frieze, Eli Shamir, Eli ...
148
Voted
ICSE
2003
IEEE-ACM
16 years 2 months ago
Patterns, Frameworks, and Middleware: Their Synergistic Relationships
The knowledge required to develop complex software has historically existed in programming folklore, the heads of experienced developers, or buried deep in the code. These locatio...
Douglas C. Schmidt, Frank Buschmann
146
Voted
CASES
2005
ACM
15 years 4 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua