Sciweavers

799 search results - page 138 / 160
» Refinement and Separation Contexts
Sort
View
129
Voted
ACSAC
2007
IEEE
15 years 7 months ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby
145
Voted
DIALM
2007
ACM
131views Algorithms» more  DIALM 2007»
15 years 7 months ago
Dessy: Towards Flexible Mobile Desktop Search
In the near future, mobile devices are expected to have a storage capacity comparable to today's desktop machines. As the amount of infomation grows, conventional search tool...
Eemil Lagerspetz, Tancred Lindholm, Sasu Tarkoma
117
Voted
DAC
2010
ACM
15 years 7 months ago
Cost-driven 3D integration with interconnect layers
The ever increasing die area of Chip Multiprocessors (CMPs) affects manufacturing yield, resulting in higher manufacture cost. Meanwhile, network-on-chip (NoC) has emerged as a p...
Xiaoxia Wu, Guangyu Sun, Xiangyu Dong, Reetuparna ...
127
Voted
LISA
2007
15 years 6 months ago
Policy-Driven Management of Data Sets
Contemporary storage systems separate the management of data from the management of the underlying physical storage media used to store that data. This separation is artificial an...
Jim Holl, Kostadis Roussos, Jim Voll
128
Voted
ASIACRYPT
2008
Springer
15 years 5 months ago
MPC vs. SFE : Unconditional and Computational Security
Abstract. In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, pa...
Martin Hirt, Ueli M. Maurer, Vassilis Zikas