Sciweavers

6756 search results - page 1270 / 1352
» Distributed Shared State
Sort
View
125
Voted
ISCA
2000
IEEE
121views Hardware» more  ISCA 2000»
15 years 7 months ago
Selective, accurate, and timely self-invalidation using last-touch prediction
Communication in cache-coherent distributed shared memory (DSM) often requires invalidating (or writing back) cached copies of a memory block, incurring high overheads. This paper...
An-Chow Lai, Babak Falsafi
127
Voted
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 7 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
155
Voted
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 7 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
ESA
1999
Springer
105views Algorithms» more  ESA 1999»
15 years 6 months ago
Provably Good and Practical Strategies for Non-Uniform Data Management in Networks
This paper deals with the on-line allocation of shared data objects to the local memory modules of the nodes in a network. We assume that the data is organized in indivisible objec...
Friedhelm Meyer auf der Heide, Berthold Vöcki...
127
Voted
ICIAP
1999
ACM
15 years 6 months ago
Random Walk Approach to Image Enhancement
The paper presents a new technique of image enhancement. The described algorithm enables the suppression of noise and contrast enhancement. The interesting feature of this new alg...
Bogdan Smolka, Konrad W. Wojciechowski, Marek Szcz...
« Prev « First page 1270 / 1352 Last » Next »