Sciweavers

1178 search results - page 166 / 236
» Responsible web caching
Sort
View
SUTC
2008
IEEE
15 years 11 months ago
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred t...
Po-Yi Li, Wen-Chih Peng, Tsung-Wei Wang, Wei-Shinn...
MICRO
2007
IEEE
94views Hardware» more  MICRO 2007»
15 years 10 months ago
Uncorq: Unconstrained Snoop Request Delivery in Embedded-Ring Multiprocessors
Snoopy cache coherence can be implemented in any physical network topology by embedding a logical unidirectional ring in the network. Control messages are forwarded using the ring...
Karin Strauss, Xiaowei Shen, Josep Torrellas
USENIX
1994
15 years 5 months ago
A Better Update Policy
y-filled data block results in a delayed write,Abstract while a modification that fills a block results in an immediate, although asynchronous, write. TheSome file systems can dela...
Jeffrey C. Mogul
MICRO
2010
IEEE
156views Hardware» more  MICRO 2010»
15 years 2 months ago
Explicit Communication and Synchronization in SARC
SARC merges cache controller and network interface functions by relying on a single hardware primitive: each access checks the tag and the state of the addressed line for possible...
Manolis Katevenis, Vassilis Papaefstathiou, Stamat...
HPDC
2006
IEEE
15 years 10 months ago
Replicating Nondeterministic Services on Grid Environments
Replication is a technique commonly used to increase the availability of services in distributed systems, including grid and web services. While replication is relatively easy for...
Xianan Zhang, Flavio Junqueira, Matti A. Hiltunen,...