Sciweavers

2265 search results - page 254 / 453
» Recovering Exchanged Data
Sort
View
121
Voted
MICRO
2010
IEEE
186views Hardware» more  MICRO 2010»
15 years 15 days ago
SAFER: Stuck-At-Fault Error Recovery for Memories
As technology scaling poses a threat to DRAM scaling due to physical limitations such as limited charge, alternative memory technologies including several emerging non-volatile me...
Nak Hee Seong, Dong Hyuk Woo, Vijayalakshmi Sriniv...
145
Voted
ITIIS
2010
129views more  ITIIS 2010»
14 years 9 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
113
Voted
WWW
2001
ACM
16 years 3 months ago
Algorithms and programming models for efficient representation of XML for Internet applications
XML is poised to take the World-Wide-Web to the next level of innovation. XML data, large or small, with or without associated schema, will be exchanged between increasing number ...
Neel Sundaresan, Reshad Moussa
OSDI
2008
ACM
16 years 2 months ago
Everest: Scaling Down Peak Loads Through I/O Off-Loading
Bursts in data center workloads are a real problem for storage subsystems. Data volumes can experience peak I/O request rates that are over an order of magnitude higher than avera...
Dushyanth Narayanan, Austin Donnelly, Eno Thereska...
SIGMOD
2009
ACM
185views Database» more  SIGMOD 2009»
16 years 2 months ago
Attacks on privacy and deFinetti's theorem
In this paper we present a method for reasoning about privacy using the concepts of exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by...
Daniel Kifer