Sciweavers

1783 search results - page 158 / 357
» Provenance and Data Synchronization
Sort
View
SOSP
2005
ACM
16 years 1 months ago
Speculative execution in a distributed file system
Speculator provides Linux kernel support for speculative execution. It allows multiple processes to share speculative state by tracking causal dependencies propagated through inte...
Edmund B. Nightingale, Peter M. Chen, Jason Flinn
TPHOL
2008
IEEE
15 years 10 months ago
The Isabelle Framework
g to the well-known “LCF approach” of secure inferences as abstract datatype constructors in ML [16]; explicit proof terms are also available [8]. Isabelle/Isar provides sophis...
Makarius Wenzel, Lawrence C. Paulson, Tobias Nipko...
ICLP
2005
Springer
15 years 9 months ago
Modeling Systems in CLP
We present a methodology for the modeling of complex program behavior in CLP. In the first part we present an informal description about how to represent a system in CLP. At its ...
Joxan Jaffar, Andrew E. Santosa, Razvan Voicu
CRYPTO
2000
Springer
110views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
Parallel Reducibility for Information-Theoretically Secure Computation
Secure Function Evaluation (SFE) protocols are very hard to design, and reducibility has been recognized as a highly desirable property of SFE protocols. Informally speaking, reduc...
Yevgeniy Dodis, Silvio Micali
NGC
2000
Springer
114views Communications» more  NGC 2000»
15 years 7 months ago
FLID-DL
Abstract--We describe fair layered increase/decrease with dynamic layering (FLID-DL): a new multirate congestion control algorithm for layered multicast sessions. FLID-DL generaliz...
John W. Byers, Michael Frumin, Gavin B. Horn, Mich...