Sciweavers

1464 search results - page 109 / 293
» Process-Oriented Collective Operations
Sort
View
ESORICS
2008
Springer
13 years 11 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
LREC
2010
208views Education» more  LREC 2010»
13 years 10 months ago
A Case Study on Interoperability for Language Resources and Applications
This paper reports our experience when integrating differ resources and services into a grid environment. The use case we address implies the deployment of several NLP application...
Marta Villegas, Núria Bel, Santiago Bel, V&...
OPODIS
2008
13 years 10 months ago
On the Time-Complexity of Robust and Amnesic Storage
We consider wait-free implementations of a regular read/ write register for unauthenticated data using a collection of 3t + k base objects, t of which can be subject to Byzantine ...
Dan Dobre, Matthias Majuntke, Neeraj Suri
SOSP
1993
ACM
13 years 10 months ago
Protection Traps and Alternatives for Memory Management of an Object-Oriented Language
Many operating systems allow user programs to specify the protectionlevel (inaccessible, read-only, read-write) of pages in their virtual memory address space, and to handle any p...
Antony L. Hosking, J. Eliot B. Moss
CACM
2010
90views more  CACM 2010»
13 years 9 months ago
The Singularity system
Every operating system embodies a collection of design decisions. Many of the decisions behind systems have remained unchanged, even as hardware and software have evolved. Operati...
James R. Larus, Galen C. Hunt