Sciweavers

2016 search results - page 328 / 404
» Megamaps: Construction and Examples
Sort
View
POPL
2001
ACM
14 years 10 months ago
Oracle-based checking of untrusted software
We present a variant of Proof-Carrying Code (PCC) in which the trusted inference rules are represented as a higher-order logic program, the proof checker is replaced by a nondeter...
George C. Necula, Shree Prakash Rahul
OSDI
2002
ACM
14 years 10 months ago
TCP Nice: A Mechanism for Background Transfers
Many distributed applications can make use of large background transfers ? transfers of data that humans are not waiting for ? to improve availability, reliability, latency or con...
Arun Venkataramani, Ravi Kokku, Michael Dahlin
OSDI
2002
ACM
14 years 10 months ago
The Effectiveness of Request Redirection on CDN Robustness
It is becoming increasingly common to construct network services using redundant resources geographically distributed across the Internet. Content Distribution Networks are a prim...
Limin Wang, Vivek S. Pai, Larry L. Peterson
VLDB
2006
ACM
207views Database» more  VLDB 2006»
14 years 10 months ago
Modeling and querying moving objects in networks
: Moving Objects Databases have become an important research issue in recent years. For and querying moving objects, there exists a comprehensive framework of abstract data types t...
Ralf Hartmut Güting, Victor Teixeira de Almeida, ...
PODS
2006
ACM
134views Database» more  PODS 2006»
14 years 10 months ago
Approximate quantiles and the order of the stream
Recently, there has been an increased focus on modeling uncertainty by distributions. Suppose we wish to compute a function of a stream whose elements are samples drawn independen...
Sudipto Guha, Andrew McGregor