Sciweavers

2702 search results - page 433 / 541
» Message from the Editor
Sort
View
CCS
1994
ACM
15 years 7 months ago
Support for the File System Security Requirements of Computational E-Mail Systems
Computational e-mail systems, which allow mail messages to containcommandscripts that automaticallyexecute upon receipt, can be used as a basis for building a variety of collabora...
Trent Jaeger, Atul Prakash
131
Voted
ASPLOS
1992
ACM
15 years 7 months ago
Access Normalization: Loop Restructuring for NUMA Compilers
: In scalable parallel machines, processors can make local memory accesses much faster than they can make remote memory accesses. In addition, when a number of remote accesses must...
Wei Li, Keshav Pingali
102
Voted
ICDCS
1989
IEEE
15 years 7 months ago
Transparent Concurrent Execution of Mutually Exclusive Alternatives
We examine the task of concurrently computing alternative solutions to a problem. We restrict our interest to the case where only one of the solutions is needed; in this case we n...
Jonathan M. Smith, Gerald Q. Maguire Jr.
AINTEC
2007
Springer
15 years 7 months ago
A Prototyping Environment for Wireless Multihop Networks
Relative to the impressive number of proposals addressing the multitude of challenges raised by IEEE 802.11-based wireless networks, few have known real implementation. In wireless...
Fehmi Ben Abdesslem, Luigi Iannone, Marcelo Dias d...
178
Voted
AOSD
2007
ACM
15 years 7 months ago
Declarative failure recovery for sensor networks
Wireless sensor networks consist of a system of distributed sensors embedded in the physical world, and promise to allow observation of previously unobservable phenomena. Since th...
Ramakrishna Gummadi, Nupur Kothari, Todd D. Millst...