Sciweavers

338 search results - page 37 / 68
» Operational Models for Reputation Servers
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
Checkpointing and rollback-recovery protocol for mobile systems with MW session guarantee
In the mobile environment, weak consistency replication of shared data is the key to obtaining high data availability, good access performance, and good scalability. Therefore new...
Jerzy Brzezinski, Anna Kobusinska, Michal Szychowi...
ICCCN
2007
IEEE
14 years 1 months ago
Lagniappe: Multi-* Programming Made Simple
—The emergence of multi-processor, multi-threaded architectures (referred to as multi- architectures) facilitates the design of high-throughput request processing systems (e.g., ...
Taylor L. Riché, R. Greg Lavender, Harrick ...
LISA
2007
13 years 10 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
USENIX
2004
13 years 9 months ago
Xen and the Art of Repeated Research
Xen is an x86 virtual machine monitor produced by the University of Cambridge Computer Laboratory and released under the GNU General Public License. Performance results comparing ...
Bryan Clark, Todd Deshane, Eli Dow, Stephen Evanch...
ADBIS
2004
Springer
136views Database» more  ADBIS 2004»
14 years 1 months ago
SBQL Views - Prototype of Updateable Views
In this paper we describe a prototype implementation of updateable views called “SBQL Views”. The prototype follows a novel approach to view updates based on the Stack-Based Ap...
Hanna Kozankiewicz, Kazimierz Subieta