Sciweavers

1830 search results - page 204 / 366
» Implementing a Tamper-Evident Database System
Sort
View
WMCSA
2003
IEEE
15 years 8 months ago
River: An Infrastructure for Context Dependent, Reactive Communication Primitives
Applications and services in ubiquitous computing systems often interact in a context-dependent, reactive manner. How information flows, and what services communicate when, is det...
Jong Hee Kang, Matthai Philipose, Gaetano Borriell...
115
Voted
SIGMOD
1997
ACM
135views Database» more  SIGMOD 1997»
15 years 7 months ago
High-Performance Sorting on Networks of Workstations
We report the performance of NOW-Sort, a collection of sorting implementations on a Network of Workstations (NOW). We find that parallel sorting on a NOW is competitive to sortin...
Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau,...
109
Voted
FMSD
2002
92views more  FMSD 2002»
15 years 3 months ago
A Simple, Object-Based View of Multiprogramming
Object-based sequential programming has had a major impact on software engineering. However, object-based concurrent programming remains elusive as an effective programming tool. T...
Jayadev Misra
NN
2008
Springer
146views Neural Networks» more  NN 2008»
15 years 3 months ago
Clustering and co-evolution to construct neural network ensembles: An experimental study
This paper introduces an approach called Clustering and Co-evolution to Construct Neural Network Ensembles (CONE). This approach creates neural network ensembles in an innovative ...
Fernanda L. Minku, Teresa Bernarda Ludermir
ESORICS
2002
Springer
16 years 3 months ago
Authentication for Distributed Web Caches
We consider the problem of offloading secure access-controlled content from central origin servers to distributed caches so clients can access a proximal cache rather than the orig...
James Giles, Reiner Sailer, Dinesh C. Verma, Sures...