Sciweavers

41 search results - page 8 / 9
» The Correctness of Crypto Transaction Sets
Sort
View
JSS
2002
128views more  JSS 2002»
13 years 8 months ago
The cost of errors in software development: evidence from industry
The search for and correction of errors in software are often time consuming and expensive components of the total cost of software development. The current research investigates ...
J. Christopher Westland
PODC
2010
ACM
14 years 12 days ago
Hybrid-secure MPC: trading information-theoretic robustness for computational privacy
Most protocols for distributed, fault-tolerant computation, or multi-party computation (MPC), provide security guarantees in an all-or-nothing fashion: If the number of corrupted p...
Christoph Lucas, Dominik Raub, Ueli M. Maurer
ISCA
2006
IEEE
142views Hardware» more  ISCA 2006»
14 years 2 months ago
Bulk Disambiguation of Speculative Threads in Multiprocessors
Transactional Memory (TM), Thread-Level Speculation (TLS), and Checkpointed multiprocessors are three popular architectural techniques based on the execution of multiple, cooperat...
Luis Ceze, James Tuck, Josep Torrellas, Calin Casc...
DASFAA
2007
IEEE
165views Database» more  DASFAA 2007»
14 years 14 days ago
Making the Most of Cache Groups
Cache groups are a powerful concept for database caching, which is used to relieve the backend database load and to keep referenced data close to the application programs at the &q...
Andreas Bühmann, Theo Härder
WWW
2008
ACM
14 years 9 months ago
Lock-free consistency control for web 2.0 applications
Online collaboration and sharing is the central theme of many webbased services that create the so-called Web 2.0 phenomena. Using the Internet as a computing platform, many Web 2...
Jiangming Yang, Haixun Wang, Ning Gu, Yiming Liu, ...