Sciweavers

1229 search results - page 174 / 246
» Trusted Computing
Sort
View
ICPADS
2007
IEEE
14 years 3 months ago
Finding candidate spots for replica servers based on demand fluctuation
Many service providers distribute various kinds of content over the Internet. They often use replica servers to provide stable service. To position them appropriately, service pro...
Masato Asahara, Akio Shimada, Hiroshi Yamada, Kenj...
ICDCS
2007
IEEE
14 years 3 months ago
Combating Double-Spending Using Cooperative P2P Systems
An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating merchants, so that ...
Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper...
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
14 years 1 months ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...
SSS
2005
Springer
14 years 2 months ago
Memory Management for Self-stabilizing Operating Systems
This work presents several approaches for designing the memory management component of self stabilizing operating systems. We state the requirements which a memory manager should ...
Shlomi Dolev, Reuven Yagel
CSE
2009
IEEE
14 years 12 days ago
Towards Enabling Web 2.0 Content Sharing beyond Walled Gardens
Abstract--Web 2.0 users have many choices of contenthosting or application-service providers (CSPs). It can be difficult for a user to share content with a set of real-life friends...
San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov