Sciweavers

246 search results - page 23 / 50
» Possibility and Impossibility Results in a Shared Memory Env...
Sort
View
IEE
2007
104views more  IEE 2007»
13 years 7 months ago
Complete distributed garbage collection using DGC-consistent cuts and .NET AOP-support
: The memory management of distributed objects, when done manually, is an error-prone task. It leads to memory leaks and dangling references, causing applications to fail. Avoiding...
Luís Veiga, P. Pereira, Paulo Ferreira
COORDINATION
2008
Springer
13 years 9 months ago
Encrypted Shared Data Spaces
Abstract. The deployment of Share Data Spaces in open, possibly hostile, environments arises the need of protecting the confidentiality of the data space content. Existing approach...
Giovanni Russello, Changyu Dong, Naranker Dulay, M...
PODC
2010
ACM
13 years 11 months ago
Constant RMR solutions to reader writer synchronization
We study Reader-Writer Exclusion [1], a well-known variant of the Mutual Exclusion problem [2] where processes are divided into two classes–readers and writers–and multiple re...
Vibhor Bhatt, Prasad Jayanti
GLVLSI
2008
IEEE
112views VLSI» more  GLVLSI 2008»
14 years 2 months ago
Instruction cache leakage reduction by changing register operands and using asymmetric sram cells
Share of leakage in cache memories is increasing with technology scaling. Studies show that most stored bits in instruction caches are zero, and hence, asymmetric SRAM cells which...
Maziar Goudarzi, Tohru Ishihara
PPAM
2005
Springer
14 years 1 months ago
Enabling Remote Method Invocations in Peer-to-Peer Environments: RMIX over JXTA
In this paper, we present a peer-to-peer (P2P) system with remote method invocations, combining RMIX and JXTA technologies, and underpinning the H2O distributed resource sharing pl...
Pawel Jurczyk, Maciej Golenia, Maciej Malawski, Da...