Sciweavers

4794 search results - page 878 / 959
» Trust-Based Mechanism Design
Sort
View
NDSS
2008
IEEE
15 years 10 months ago
Usable PIR
In [22] we showed that existing single-server computational private information retrieval (PIR) protocols for the purpose of preserving client access patterns leakage are orders o...
Peter Williams, Radu Sion
PDP
2008
IEEE
15 years 10 months ago
Just-In-Time Scheduling for Loop-based Speculative Parallelization
Scheduling for speculative parallelization is a problem that remained unsolved despite its importance. Simple methods such as Fixed-Size Chunking (FSC) need several ‘dry-runs’...
Diego R. Llanos Ferraris, David Orden, Belé...
SEUS
2008
IEEE
15 years 10 months ago
Data Services in Distributed Real-Time Embedded Systems
The computing systems are becoming deeply embedded into ordinary life and interact with physical processes and events. They monitor the physical world with sensors and provide app...
Woochul Kang, Sang Hyuk Son
SRDS
2008
IEEE
15 years 10 months ago
An Incremental File System Consistency Checker for Block-Level CDP Systems
A block-level continuous data protection (CDP) system logs every disk block update from an application server (e.g., a file or DBMS server) to a storage system so that any disk u...
Maohua Lu, Tzi-cker Chiueh, Shibiao Lin
TABLETOP
2008
IEEE
15 years 10 months ago
On top of tabletop: A virtual touch panel display
In the real world, a physical tabletop provides public and private needs for people around the table. For competing scenarios such as playing a poker game or running a price negot...
Li-Wei Chan, Ting-Ting Hu, Jin-Yao Lin, Yi-Ping Hu...