Sciweavers

1833 search results - page 114 / 367
» Mechanized Verification with Sharing
Sort
View
FTDCS
2004
IEEE
15 years 8 months ago
Exploiting Semantic Proximity in Peer-to-Peer Content Searching
A lot of recent work has dealt with improving performance of content searching in peer-to-peer file sharing systems. In this paper we attack this problem by modifying the overlay ...
Spyros Voulgaris, Anne-Marie Kermarrec, Laurent Ma...
NGC
2001
Springer
116views Communications» more  NGC 2001»
15 years 9 months ago
Scalable IP Multicast Sender Access Control for Bi-directional Trees
Bi-directional shared tree is an efficient routing scheme for interactive multicast applications with multiple sources. Given the open-group IP multicast service model, it is impor...
Ning Wang, George Pavlou
SC
2003
ACM
15 years 9 months ago
A Self-Organizing Flock of Condors
Condor provides high throughput computing by leveraging idlecycles on off-the-shelf desktop machines. It also supports flocking, a mechanism for sharing resources among Condor po...
Ali Raza Butt, Rongmei Zhang, Y. Charlie Hu
ICDE
2004
IEEE
124views Database» more  ICDE 2004»
16 years 5 months ago
Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not nec...
HweeHwa Pang, Kian-Lee Tan
FMSD
2002
114views more  FMSD 2002»
15 years 4 months ago
The Correctness of the Fast Fourier Transform: A Structured Proof in ACL2
The powerlists data structure, created by Misra in the early 90s, is well suited to express recursive, data-parallel algorithms. Misra has shown how powerlists can be used to give ...
Ruben Gamboa