Now showing items 1-10 of 98
Faster AFS
(Center for Information Technology Integration, 1992-06-22)
The AFS Cache Manager fetches files from the AFS file server, and caches them into a local file system. Given this model, users expect reads of locally cached files to perform at local file system rates. However, read ...
Cache coherence requirements for interprocess rendezvous
(Kluwer Academic Publishers-Plenum Publishers; Plenum Publishing Corporation ; Springer Science+Business Media, 1990-02)
Multiprocessors in which a shared bus is used by the processor to communicate with common memory are an emerging class of machines where there is a need to support parallel programming languages. A language construct that ...
Datalog vs first-order logic
(Elsevier, 1994-12)
Our main result is that every datalog query expressible in first-order logic is bounded; in terms of classical model theory it is a kind of compactness theorem for finite structures. In addition, we give some counter-examples ...
Analytic evaluation of contention protocols used in distributed real-time systems
(Kluwer Academic Publishers; Springer Science+Business Media, 1995-07)
The probability of a station failing to deliver packets before their deadlines, called the probability of dynamic failure, P dyn , is an important measure for the communication subsystem of a distributed real-time system. ...
Taking a LITTLE WORK Along
(Center for Information Technology Integration, 1991-08-28)
The continuing micro-miniaturization of components has moved high-powered, microprocessor-based machines from the desktop, to the laptop, to notebook-sized, and now to palmtop computers. These machines are distinguished ...
Regular languages in NC1
(Elsevier, 1992-06)
We give several characterizations, in terms of formal logic, semigroup theory, and operations on languages, of the regular languages in the circuit complexity class AC0, thus answering a question of Chandra, Fortune, and ...
Access Control in a Workstation-Based Distributed Computing Environment
(Center for Information Technology Integration, 1990-07-17)
This paper describes the mechanisms employed to control access to system services on the IFS project. We base our distributed computing environment on systems that we trust, and run those systems in physically secure rooms. ...
Depth from relative normal flows
(Elsevier, 1990)
Most of the depth from image flow algorithms has to rely on either good initial guesses, or some assumptions about the object surfaces to achieve solutions that agree with the physical world. Waxman and Sinha point out ...
XNetMod: A Design Tool for Large-Scale Networks
(Center for Information Technology Integration, 1993-08-18)
The network modeling tool XNetMod (based on NetMod) uses simple analytical models to allow designers of interconnected local area networks to analyze and simulate the potential performance of networks. This tool can be ...