Sciweavers

2779 search results - page 492 / 556
» Modelling Immunological Memory
Sort
View
ESORICS
2010
Springer
13 years 11 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
HPDC
2010
IEEE
13 years 11 months ago
Fast and scalable simulation of volunteer computing systems using SimGrid
Advances in internetworking technology and the decreasing cost-performance ratio of commodity computing components have enabled Volunteer Computing (VC). VC platforms aggregate te...
Bruno Donassolo, Henri Casanova, Arnaud Legrand, P...
HPDC
2010
IEEE
13 years 11 months ago
New caching techniques for web search engines
This paper proposes a cache hierarchy that enables Web search engines to efficiently process user queries. The different caches in the hierarchy are used to store pieces of data w...
Mauricio Marín, Veronica Gil Costa, Carlos ...
PODC
2010
ACM
13 years 10 months ago
The k-bakery: local-spin k-exclusion using non-atomic reads and writes
Mutual exclusion is used to coordinate access to shared resources by concurrent processes. k-Exclusion is a variant of mutual exclusion in which up to k processes can simultaneous...
Robert Danek
AAI
2008
93views more  AAI 2008»
13 years 10 months ago
Adaptive Machine Learning in Delayed Feedback Domains by Selective Relearning
We present a novel hybrid technique for improving the predictive performance of an online Machine Learning system: Combining advantages from both memory based and concept based pr...
Marcus-Christopher Ludl, Achim Lewandowski, Georg ...