We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed ï¬...
Jason Flinn, Shafeeq Sinnamohideen, Niraj Tolia, M...
Isosurfacing, by itself, is a common visualization technique for investigating 3D vector fields. Applying texturebased flow visualization techniques to isosurfaces provides engine...
: Ubiquitous integrated computing makes possible new workflow processes and business models which can meet the challenges from the fast growing digital convergence. An integrated i...
While extensive work has been done on evaluating queries over tuple-independent probabilistic databases, query evaluation over correlated data has received much less attention eve...
The virtues of deterministic parallelism have been argued for decades and many forms of deterministic parallelism have been described and analyzed. Here we are concerned with one ...
Guy E. Blelloch, Jeremy T. Fineman, Phillip B. Gib...