Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 242
1.
  • SybilLimit: A Near-Optimal ... SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks
    Haifeng Yu; Gibbons, Phillip B; Kaminsky, Michael ... IEEE/ACM transactions on networking, 2010-June, 2010-6-00, 20100601, Letnik: 18, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Open-access distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks , where a malicious user creates multiple fake identities (called sybil nodes ). Without a ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
2.
  • SybilLimit: A Near-Optimal ... SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
    Haifeng Yu; Gibbons, P.B.; Kaminsky, M. ... 2008 IEEE Symposium on Security and Privacy (sp 2008), 05/2008
    Conference Proceeding
    Odprti dostop

    Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sybil nodes). Without ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
3.
  • A case for richer cross-lay... A case for richer cross-layer abstractions
    Vijaykumar, Nandita; Jain, Abhilasha; Majumdar, Diptesh ... 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA), 06/2018
    Conference Proceeding

    This paper makes a case for a new cross-layer interface, Expressive Memory (XMem), to communicate higher-level program semantics from the application to the system software and hardware architecture. ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
4.
  • Synopsis diffusion for robu... Synopsis diffusion for robust aggregation in sensor networks
    Nath, Suman; Gibbons, Phillip B.; Seshan, Srinivasan ... ACM transactions on sensor networks, 03/2008, Letnik: 4, Številka: 2
    Journal Article
    Recenzirano

    Previous approaches for computing duplicate-sensitive aggregates in wireless sensor networks have used a tree topology, in order to conserve energy and to avoid double-counting sensor readings. ...
Celotno besedilo
Dostopno za: NUK, UL
5.
  • Exploiting compressed block... Exploiting compressed block size as an indicator of future reuse
    Pekhimenko, Gennady; Huberty, Tyler; Rui Cai ... 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA), 02/2015
    Conference Proceeding
    Odprti dostop

    We introduce a set of new Compression-Aware Management Policies (CAMP) for on-chip caches that employ data compression. Our management policies are based on two key ideas. First, we show that it is ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
6.
  • Tributaries and deltas Tributaries and deltas
    Manjhi, Amit; Nath, Suman; Gibbons, Phillip B. International Conference on Management of Data: Proceedings of the 2005 ACM SIGMOD international conference on Management of data; 14-16 June 2005, 06/2005
    Conference Proceeding

    Existing energy-efficient approaches to in-network aggregation in sensor networks can be classified into two categories, tree-based and multi-path-based, with each having unique strengths and ...
Celotno besedilo
Dostopno za: NUK, UL
7.
  • Mitigating Prefetcher-Cause... Mitigating Prefetcher-Caused Pollution Using Informed Caching Policies for Prefetched Blocks
    Seshadri, Vivek; Yedkar, Samihan; Xin, Hongyi ... ACM transactions on architecture and code optimization, 01/2015, Letnik: 11, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Many modern high-performance processors prefetch blocks into the on-chip cache. Prefetched blocks can potentially pollute the cache by evicting more useful blocks. In this work, we observe that both ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
8.
  • The Cost of Fault Tolerance... The Cost of Fault Tolerance in Multi-Party Communication Complexity
    BINBIN CHEN; HAIFENG YU; YUDA ZHAO ... Journal of the ACM, 05/2014, Letnik: 61, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Multi-party communication complexity involves distributed computation of a function over inputs held by multiple distributed players. A key focus of distributed computing research, since the very ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
9.
  • Improving hash join perform... Improving hash join performance through prefetching
    SHIMIN CHEN; AILAMAKI, Anastassia; GIBBONS, Phillip B ... ACM transactions on database systems, 08/2007, Letnik: 32, Številka: 3
    Journal Article
    Recenzirano

    Hash join algorithms suffer from extensive CPU cache stalls. This article shows that the standard hash join algorithm for disk-oriented databases (i.e. GRACE) spends over 80% of its user time stalled ...
Celotno besedilo
Dostopno za: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
10.
  • Agents of Autonomy: A Syste... Agents of Autonomy: A Systematic Study of Robotics on Modern Hardware
    Bakhshalipour, Mohammad; Gibbons, Phillip B. Proceedings of the ACM on measurement and analysis of computing systems, 12/2023, Letnik: 7, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    As robots increasingly permeate modern society, it is crucial for the system and hardware research community to bridge its long-standing gap with robotics. This divide has persisted due to the lack ...
Celotno besedilo
Dostopno za: NUK, UL
1 2 3 4 5
zadetkov: 242

Nalaganje filtrov