Sciweavers

1744 search results - page 152 / 349
» The Steganographic File System
Sort
View
109
Voted
ISEMANTICS
2010
15 years 5 months ago
BibBase triplified
We present BibBase, a system for publishing and managing bibliographic data available in BibTeX files. BibBase uses a powerful yet light-weight approach to transform BibTeX files ...
Oktie Hassanzadeh, Reynold Xin, Christian Fritz, Y...
114
Voted
HOTOS
2009
IEEE
15 years 7 months ago
On Availability of Intermediate Data in Cloud Computations
This paper takes a renewed look at the problem of managing intermediate data that is generated during dataflow computations (e.g., MapReduce, Pig, Dryad, etc.) within clouds. We d...
Steven Y. Ko, Imranul Hoque, Brian Cho, Indranil G...
116
Voted
USS
2004
15 years 5 months ago
Fixing Races for Fun and Profit: How to Use access(2)
It is well known that it is insecure to use the access(2) system call in a setuid program to test for the ability of the program's executor to access a file before opening sa...
Drew Dean, Alan J. Hu
117
Voted
FIRSTMONDAY
2000
75views more  FIRSTMONDAY 2000»
15 years 3 months ago
Free Riding on Gnutella
An extensive analysis of user traffic on Gnutella shows a significant amount of free riding in the system. By sampling messages on the Gnutella network over a 24-hour period, we e...
Eytan Adar, Bernardo A. Huberman
120
Voted
ASM
2004
ASM
15 years 9 months ago
Observations on the Decidability of Transitions
Consider a multiple-agent transition system such that, for some basic types T1, . . . , Tn, the state of any agent can be represented as an element of the Cartesian product T1 ×·...
Yuri Gurevich, Rostislav Yavorskiy