Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"University of Texas – Austin" +contributor:("Alvisi, Lorenzo"). Showing records 1 – 30 of 30 total matches.

Search Limiters

Last 2 Years | English Only

Department

▼ Search Limiters


University of Texas – Austin

1. Setty, Srinath T.V. Toward practical argument systems for verifiable computation.

Degree: PhD, Computer Sciences, 2014, University of Texas – Austin

 How can a client extract useful work from a server without trusting it to compute correctly? A modern motivation for this classic question is third… (more)

Subjects/Keywords: Verifiable computation; Argument systems; Outsourced computation; Proof-based verifiable computation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Setty, S. T. V. (2014). Toward practical argument systems for verifiable computation. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/28365

Chicago Manual of Style (16th Edition):

Setty, Srinath T V. “Toward practical argument systems for verifiable computation.” 2014. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/28365.

MLA Handbook (7th Edition):

Setty, Srinath T V. “Toward practical argument systems for verifiable computation.” 2014. Web. 06 Mar 2021.

Vancouver:

Setty STV. Toward practical argument systems for verifiable computation. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2014. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/28365.

Council of Science Editors:

Setty STV. Toward practical argument systems for verifiable computation. [Doctoral Dissertation]. University of Texas – Austin; 2014. Available from: http://hdl.handle.net/2152/28365


University of Texas – Austin

2. Xie, Chao, Ph. D. High-performance transactional storage.

Degree: PhD, Computer science, 2016, University of Texas – Austin

 Developers face a fundamental tension between performance and ease of programming when building complex applications. On the one hand, by freeing developers from having to… (more)

Subjects/Keywords: Transaction; High-performance; Distributed database

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xie, Chao, P. D. (2016). High-performance transactional storage. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/42014

Chicago Manual of Style (16th Edition):

Xie, Chao, Ph D. “High-performance transactional storage.” 2016. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/42014.

MLA Handbook (7th Edition):

Xie, Chao, Ph D. “High-performance transactional storage.” 2016. Web. 06 Mar 2021.

Vancouver:

Xie, Chao PD. High-performance transactional storage. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2016. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/42014.

Council of Science Editors:

Xie, Chao PD. High-performance transactional storage. [Doctoral Dissertation]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/42014


University of Texas – Austin

3. Crooks, Natacha. A client-centric approach to transactional datastores.

Degree: PhD, Computer Science, 2020, University of Texas – Austin

 Modern applications must collect and store massive amounts of data. Cloud storage offers these applications simplicity: the abstraction of a failure-free, perfectly scalable black-box. While… (more)

Subjects/Keywords: Distributed systems; Transactional datastores; Cloud storage; Cloud storage systems; Cloud storage privacy; Cloud storage security; Cloud storage performance; Cloud storage semantics

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Crooks, N. (2020). A client-centric approach to transactional datastores. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://dx.doi.org/10.26153/tsw/8360

Chicago Manual of Style (16th Edition):

Crooks, Natacha. “A client-centric approach to transactional datastores.” 2020. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://dx.doi.org/10.26153/tsw/8360.

MLA Handbook (7th Edition):

Crooks, Natacha. “A client-centric approach to transactional datastores.” 2020. Web. 06 Mar 2021.

Vancouver:

Crooks N. A client-centric approach to transactional datastores. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2020. [cited 2021 Mar 06]. Available from: http://dx.doi.org/10.26153/tsw/8360.

Council of Science Editors:

Crooks N. A client-centric approach to transactional datastores. [Doctoral Dissertation]. University of Texas – Austin; 2020. Available from: http://dx.doi.org/10.26153/tsw/8360


University of Texas – Austin

4. -6770-7949. Bringing modular concurrency control to the next level.

Degree: PhD, Computer Science, 2019, University of Texas – Austin

 Database users face a tension between ease-of-programming and high performance: ACID transactions can greatly simplify the programming effort of database applications by providing four useful… (more)

Subjects/Keywords: Distributed database; Transaction; Concurrency control; Modular concurrency control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-6770-7949. (2019). Bringing modular concurrency control to the next level. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://dx.doi.org/10.26153/tsw/1500

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-6770-7949. “Bringing modular concurrency control to the next level.” 2019. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://dx.doi.org/10.26153/tsw/1500.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-6770-7949. “Bringing modular concurrency control to the next level.” 2019. Web. 06 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-6770-7949. Bringing modular concurrency control to the next level. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2019. [cited 2021 Mar 06]. Available from: http://dx.doi.org/10.26153/tsw/1500.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-6770-7949. Bringing modular concurrency control to the next level. [Doctoral Dissertation]. University of Texas – Austin; 2019. Available from: http://dx.doi.org/10.26153/tsw/1500

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Texas – Austin

5. -6276-2164. Toward practical and private online services.

Degree: PhD, Computer Science, 2018, University of Texas – Austin

 Today's common online services (social networks, media streaming, messaging, email, etc.) bring convenience. However, these services are susceptible to privacy leaks. Certainly, email snooping by… (more)

Subjects/Keywords: Private media delivery; Encrypted email; Private information retrieval; Secure two-party computation; Linear classifiers

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-6276-2164. (2018). Toward practical and private online services. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/63351

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-6276-2164. “Toward practical and private online services.” 2018. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/63351.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-6276-2164. “Toward practical and private online services.” 2018. Web. 06 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-6276-2164. Toward practical and private online services. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2018. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/63351.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-6276-2164. Toward practical and private online services. [Doctoral Dissertation]. University of Texas – Austin; 2018. Available from: http://hdl.handle.net/2152/63351

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Texas – Austin

6. -6848-2988. Exploiting leakage in privacy-protecting systems.

Degree: PhD, Computer science, 2016, University of Texas – Austin

 Conventional systems store data unencrypted. This allows them to easily access and manipulate their data. However, by not protecting their data, these systems are at… (more)

Subjects/Keywords: Security; Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-6848-2988. (2016). Exploiting leakage in privacy-protecting systems. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/45559

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-6848-2988. “Exploiting leakage in privacy-protecting systems.” 2016. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/45559.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-6848-2988. “Exploiting leakage in privacy-protecting systems.” 2016. Web. 06 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-6848-2988. Exploiting leakage in privacy-protecting systems. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2016. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/45559.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-6848-2988. Exploiting leakage in privacy-protecting systems. [Doctoral Dissertation]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/45559

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

7. Wong, Edmund Liangfei. Raising the BAR in dependable cooperative services.

Degree: PhD, Computer Science, 2013, University of Texas – Austin

 Cooperative services – a term which includes any system that relies on the resources and participation of its clients to function – have proven to be a… (more)

Subjects/Keywords: Cooperative services; P2P; Game theory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wong, E. L. (2013). Raising the BAR in dependable cooperative services. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/21358

Chicago Manual of Style (16th Edition):

Wong, Edmund Liangfei. “Raising the BAR in dependable cooperative services.” 2013. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/21358.

MLA Handbook (7th Edition):

Wong, Edmund Liangfei. “Raising the BAR in dependable cooperative services.” 2013. Web. 06 Mar 2021.

Vancouver:

Wong EL. Raising the BAR in dependable cooperative services. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2013. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/21358.

Council of Science Editors:

Wong EL. Raising the BAR in dependable cooperative services. [Doctoral Dissertation]. University of Texas – Austin; 2013. Available from: http://hdl.handle.net/2152/21358

8. Kapritsos, Emmanouil. Replicating multithreaded services.

Degree: PhD, Computer Sciences, 2014, University of Texas – Austin

 For the last 40 years, the systems community has invested a lot of effort in designing techniques for building fault tolerant distributed systems and services.… (more)

Subjects/Keywords: Fault tolerance; Replication; Multithreading

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kapritsos, E. (2014). Replicating multithreaded services. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/28366

Chicago Manual of Style (16th Edition):

Kapritsos, Emmanouil. “Replicating multithreaded services.” 2014. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/28366.

MLA Handbook (7th Edition):

Kapritsos, Emmanouil. “Replicating multithreaded services.” 2014. Web. 06 Mar 2021.

Vancouver:

Kapritsos E. Replicating multithreaded services. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2014. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/28366.

Council of Science Editors:

Kapritsos E. Replicating multithreaded services. [Doctoral Dissertation]. University of Texas – Austin; 2014. Available from: http://hdl.handle.net/2152/28366

9. -6879-6322. Algorithms for dynamic and distributed networks : shortest paths, betweenness centrality and related problems.

Degree: PhD, Computer Science, 2018, University of Texas – Austin

 In this thesis we study the problem of computing Betweenness Centrality in dynamic and distributed networks. Betweenness Centrality (BC) is a well-known measure for the… (more)

Subjects/Keywords: Betweenness centrality; Dynamic algorithms; Distributed algorithms

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-6879-6322. (2018). Algorithms for dynamic and distributed networks : shortest paths, betweenness centrality and related problems. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/63353

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-6879-6322. “Algorithms for dynamic and distributed networks : shortest paths, betweenness centrality and related problems.” 2018. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/63353.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-6879-6322. “Algorithms for dynamic and distributed networks : shortest paths, betweenness centrality and related problems.” 2018. Web. 06 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-6879-6322. Algorithms for dynamic and distributed networks : shortest paths, betweenness centrality and related problems. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2018. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/63353.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-6879-6322. Algorithms for dynamic and distributed networks : shortest paths, betweenness centrality and related problems. [Doctoral Dissertation]. University of Texas – Austin; 2018. Available from: http://hdl.handle.net/2152/63353

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Texas – Austin

10. -8499-7554. Galois : a system for parallel execution of irregular algorithms.

Degree: PhD, Computer Sciences, 2015, University of Texas – Austin

 A programming model which allows users to program with high productivity and which produces high performance executions has been a goal for decades. This dissertation… (more)

Subjects/Keywords: Parallel programming; Multicore

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-8499-7554. (2015). Galois : a system for parallel execution of irregular algorithms. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/30536

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-8499-7554. “Galois : a system for parallel execution of irregular algorithms.” 2015. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/30536.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-8499-7554. “Galois : a system for parallel execution of irregular algorithms.” 2015. Web. 06 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-8499-7554. Galois : a system for parallel execution of irregular algorithms. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2015. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/30536.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-8499-7554. Galois : a system for parallel execution of irregular algorithms. [Doctoral Dissertation]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/30536

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

11. -5937-3237. A new approach to detecting failures in distributed systems.

Degree: PhD, Computer science, 2015, University of Texas – Austin

 Fault-tolerant distributed systems often handle failures in two steps: first, detect the failure and, second, take some recovery action. A common approach to detecting failures… (more)

Subjects/Keywords: Computer science; Fault tolerance; Distributed systems; Failure detection

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-5937-3237. (2015). A new approach to detecting failures in distributed systems. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/31376

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-5937-3237. “A new approach to detecting failures in distributed systems.” 2015. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/31376.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-5937-3237. “A new approach to detecting failures in distributed systems.” 2015. Web. 06 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-5937-3237. A new approach to detecting failures in distributed systems. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2015. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/31376.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-5937-3237. A new approach to detecting failures in distributed systems. [Doctoral Dissertation]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/31376

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Texas – Austin

12. -2779-6876. Secure protocols for contactless credit cards and electronic wallets.

Degree: PhD, Computer Science, 2018, University of Texas – Austin

 The contactless credit card protocol in use today is insecure. The credit card industry has chosen to use the NFC channel for contactless transactions. However,… (more)

Subjects/Keywords: Security; Privacy; Credit cards; Payments; Transactions; Nfc; Rfid; Proximity; Electronic wallet; Unlinkability; Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-2779-6876. (2018). Secure protocols for contactless credit cards and electronic wallets. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/63350

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-2779-6876. “Secure protocols for contactless credit cards and electronic wallets.” 2018. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/63350.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-2779-6876. “Secure protocols for contactless credit cards and electronic wallets.” 2018. Web. 06 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-2779-6876. Secure protocols for contactless credit cards and electronic wallets. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2018. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/63350.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-2779-6876. Secure protocols for contactless credit cards and electronic wallets. [Doctoral Dissertation]. University of Texas – Austin; 2018. Available from: http://hdl.handle.net/2152/63350

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


University of Texas – Austin

13. Li, Xin, Ph. D. Distributed computing and cryptography with general weak random sources.

Degree: PhD, Computer Science, 2011, University of Texas – Austin

 The use of randomness in computer science is ubiquitous. Randomized protocols have turned out to be much more efficient than their deterministic counterparts. In addition,… (more)

Subjects/Keywords: Randomness; Weak random source; Extractor; Distributed computing; Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, Xin, P. D. (2011). Distributed computing and cryptography with general weak random sources. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/30361

Chicago Manual of Style (16th Edition):

Li, Xin, Ph D. “Distributed computing and cryptography with general weak random sources.” 2011. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/30361.

MLA Handbook (7th Edition):

Li, Xin, Ph D. “Distributed computing and cryptography with general weak random sources.” 2011. Web. 06 Mar 2021.

Vancouver:

Li, Xin PD. Distributed computing and cryptography with general weak random sources. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2011. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/30361.

Council of Science Editors:

Li, Xin PD. Distributed computing and cryptography with general weak random sources. [Doctoral Dissertation]. University of Texas – Austin; 2011. Available from: http://hdl.handle.net/2152/30361


University of Texas – Austin

14. Sperisen, Benjamin Leonard. Essays on reputation and repeated games.

Degree: PhD, Economics, 2015, University of Texas – Austin

 This dissertation consists of three essays on reputation and repeated games. Reputation models typically assume players have full memory of past events, yet in many… (more)

Subjects/Keywords: Reputation; Repeated games; Mechanic game; Bounded memory; Purifiability; Drug wars; Cartels

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sperisen, B. L. (2015). Essays on reputation and repeated games. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/30940

Chicago Manual of Style (16th Edition):

Sperisen, Benjamin Leonard. “Essays on reputation and repeated games.” 2015. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/30940.

MLA Handbook (7th Edition):

Sperisen, Benjamin Leonard. “Essays on reputation and repeated games.” 2015. Web. 06 Mar 2021.

Vancouver:

Sperisen BL. Essays on reputation and repeated games. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2015. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/30940.

Council of Science Editors:

Sperisen BL. Essays on reputation and repeated games. [Doctoral Dissertation]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/30940


University of Texas – Austin

15. Pu, Xiao. A bandwidth-enhanced fractional-N PLL through reference multiplication.

Degree: PhD, Electrical and Computer Engineering, 2011, University of Texas – Austin

 The loop bandwidth of a fractional-N PLL is a desirable parameter for many applications. A wide bandwidth allows a significant attenuation of phase noise arising… (more)

Subjects/Keywords: PLL; Fractional-N; Bandwidth; Spur

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pu, X. (2011). A bandwidth-enhanced fractional-N PLL through reference multiplication. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2011-08-4149

Chicago Manual of Style (16th Edition):

Pu, Xiao. “A bandwidth-enhanced fractional-N PLL through reference multiplication.” 2011. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/ETD-UT-2011-08-4149.

MLA Handbook (7th Edition):

Pu, Xiao. “A bandwidth-enhanced fractional-N PLL through reference multiplication.” 2011. Web. 06 Mar 2021.

Vancouver:

Pu X. A bandwidth-enhanced fractional-N PLL through reference multiplication. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2011. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/ETD-UT-2011-08-4149.

Council of Science Editors:

Pu X. A bandwidth-enhanced fractional-N PLL through reference multiplication. [Doctoral Dissertation]. University of Texas – Austin; 2011. Available from: http://hdl.handle.net/2152/ETD-UT-2011-08-4149


University of Texas – Austin

16. Kim, Sangman. Networking abstractions for GPU programs.

Degree: PhD, Computer Sciences, 2015, University of Texas – Austin

 Graphics Processing Units (GPUs) are becoming major general-purpose computing hardware for high-performance parallel computation. Despite their general computation capability and impressive performance, GPUs still lack… (more)

Subjects/Keywords: GPU; Operating systems; Network; Socket; RDMA; CUDA; Infiniband

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kim, S. (2015). Networking abstractions for GPU programs. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/46765

Chicago Manual of Style (16th Edition):

Kim, Sangman. “Networking abstractions for GPU programs.” 2015. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/46765.

MLA Handbook (7th Edition):

Kim, Sangman. “Networking abstractions for GPU programs.” 2015. Web. 06 Mar 2021.

Vancouver:

Kim S. Networking abstractions for GPU programs. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2015. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/46765.

Council of Science Editors:

Kim S. Networking abstractions for GPU programs. [Doctoral Dissertation]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/46765

17. -8037-0201. Formal verification of application and system programs based on a validated x86 ISA model.

Degree: PhD, Computer science, 2016, University of Texas – Austin

 Two main kinds of tools available for formal software verification are point tools and general-purpose tools. Point tools are targeted towards bug-hunting or proving a… (more)

Subjects/Keywords: Formal verification; x86 Machine-code analysis; x86 ISA; ACL2; Theorem proving; Program verification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-8037-0201. (2016). Formal verification of application and system programs based on a validated x86 ISA model. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/46437

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-8037-0201. “Formal verification of application and system programs based on a validated x86 ISA model.” 2016. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/46437.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-8037-0201. “Formal verification of application and system programs based on a validated x86 ISA model.” 2016. Web. 06 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-8037-0201. Formal verification of application and system programs based on a validated x86 ISA model. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2016. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/46437.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-8037-0201. Formal verification of application and system programs based on a validated x86 ISA model. [Doctoral Dissertation]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/46437

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

18. -3461-6084. UbiPAL : secure messaging and access control for ubiquitous computing.

Degree: MSin Computer Sciences, Computer Science, 2015, University of Texas – Austin

 The ubiquitous computing environment and modern trends in personal computing, such as body sensor networks and smart houses, create unique challenges in privacy and access… (more)

Subjects/Keywords: Ubiquitous computing; Mobile computing; Distributed systems; Access control; Secure messaging; Privacy; Security; Languages

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-3461-6084. (2015). UbiPAL : secure messaging and access control for ubiquitous computing. (Masters Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/31851

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-3461-6084. “UbiPAL : secure messaging and access control for ubiquitous computing.” 2015. Masters Thesis, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/31851.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-3461-6084. “UbiPAL : secure messaging and access control for ubiquitous computing.” 2015. Web. 06 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-3461-6084. UbiPAL : secure messaging and access control for ubiquitous computing. [Internet] [Masters thesis]. University of Texas – Austin; 2015. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/31851.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-3461-6084. UbiPAL : secure messaging and access control for ubiquitous computing. [Masters Thesis]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/31851

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

19. Wang, Yang, Ph. D. Separating data from metadata for robustness and scalability.

Degree: PhD, Computer Science, 2014, University of Texas – Austin

 When building storage systems that aim to simultaneously provide robustness, scalability, and efficiency, one faces a fundamental tension, as higher robustness typically incurs higher costs… (more)

Subjects/Keywords: Metadata; Robustness; Scalability; Storage; Replication; Fault tolerace

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Yang, P. D. (2014). Separating data from metadata for robustness and scalability. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/28370

Chicago Manual of Style (16th Edition):

Wang, Yang, Ph D. “Separating data from metadata for robustness and scalability.” 2014. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/28370.

MLA Handbook (7th Edition):

Wang, Yang, Ph D. “Separating data from metadata for robustness and scalability.” 2014. Web. 06 Mar 2021.

Vancouver:

Wang, Yang PD. Separating data from metadata for robustness and scalability. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2014. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/28370.

Council of Science Editors:

Wang, Yang PD. Separating data from metadata for robustness and scalability. [Doctoral Dissertation]. University of Texas – Austin; 2014. Available from: http://hdl.handle.net/2152/28370

20. Rebello, Rohan Francis. Byzantine fault tolerant web applications using the UpRight library.

Degree: MA, Computer Sciences, 2009, University of Texas – Austin

 Web applications are widely used for email, online sales, auctions, collaboration, etc. Most of today’s highly-available web applications implement fault tolerant protocols in order to… (more)

Subjects/Keywords: fault tolerance; byzantine; web applications; UpRight library

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rebello, R. F. (2009). Byzantine fault tolerant web applications using the UpRight library. (Masters Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2009-08-362

Chicago Manual of Style (16th Edition):

Rebello, Rohan Francis. “Byzantine fault tolerant web applications using the UpRight library.” 2009. Masters Thesis, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/ETD-UT-2009-08-362.

MLA Handbook (7th Edition):

Rebello, Rohan Francis. “Byzantine fault tolerant web applications using the UpRight library.” 2009. Web. 06 Mar 2021.

Vancouver:

Rebello RF. Byzantine fault tolerant web applications using the UpRight library. [Internet] [Masters thesis]. University of Texas – Austin; 2009. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/ETD-UT-2009-08-362.

Council of Science Editors:

Rebello RF. Byzantine fault tolerant web applications using the UpRight library. [Masters Thesis]. University of Texas – Austin; 2009. Available from: http://hdl.handle.net/2152/ETD-UT-2009-08-362


University of Texas – Austin

21. Napper, Jeffrey Michael. Robust multithreaded applications.

Degree: PhD, Computer Sciences, 2008, University of Texas – Austin

 This thesis discusses techniques for improving the fault tolerance of multithreaded applications. We consider the impact on fault tolerance methods of sharing address space and… (more)

Subjects/Keywords: Simultaneous multithreading processors; Fault-tolerant computing; Computer storage devices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Napper, J. M. (2008). Robust multithreaded applications. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/3966

Chicago Manual of Style (16th Edition):

Napper, Jeffrey Michael. “Robust multithreaded applications.” 2008. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/3966.

MLA Handbook (7th Edition):

Napper, Jeffrey Michael. “Robust multithreaded applications.” 2008. Web. 06 Mar 2021.

Vancouver:

Napper JM. Robust multithreaded applications. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2008. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/3966.

Council of Science Editors:

Napper JM. Robust multithreaded applications. [Doctoral Dissertation]. University of Texas – Austin; 2008. Available from: http://hdl.handle.net/2152/3966


University of Texas – Austin

22. Martin, Jean-Philippe Etienne. Byzantine fault-tolerance and beyond.

Degree: PhD, Computer Sciences, 2006, University of Texas – Austin

 Byzantine fault-tolerance techniques are useful because they tolerate arbitrary faults regardless of cause: bugs, hardware glitches, even hackers. These techniques have recently gained popularity after… (more)

Subjects/Keywords: Fault-tolerant computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Martin, J. E. (2006). Byzantine fault-tolerance and beyond. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/2828

Chicago Manual of Style (16th Edition):

Martin, Jean-Philippe Etienne. “Byzantine fault-tolerance and beyond.” 2006. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/2828.

MLA Handbook (7th Edition):

Martin, Jean-Philippe Etienne. “Byzantine fault-tolerance and beyond.” 2006. Web. 06 Mar 2021.

Vancouver:

Martin JE. Byzantine fault-tolerance and beyond. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2006. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/2828.

Council of Science Editors:

Martin JE. Byzantine fault-tolerance and beyond. [Doctoral Dissertation]. University of Texas – Austin; 2006. Available from: http://hdl.handle.net/2152/2828

23. Li, Harry Chu-Kit. Robust peer-to-peer systems.

Degree: PhD, Computer Sciences, 2009, University of Texas – Austin

 Peer-to-peer (p2p) approaches are an increasingly effective way to deploy services. Popular examples include BitTorrent, Skype, and KaZaA. These approaches are attractive because they can… (more)

Subjects/Keywords: Peer-to-peer systems; P2p systems; Nash equilibria; BAR Gossip

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Li, H. C. (2009). Robust peer-to-peer systems. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/29627

Chicago Manual of Style (16th Edition):

Li, Harry Chu-Kit. “Robust peer-to-peer systems.” 2009. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/29627.

MLA Handbook (7th Edition):

Li, Harry Chu-Kit. “Robust peer-to-peer systems.” 2009. Web. 06 Mar 2021.

Vancouver:

Li HC. Robust peer-to-peer systems. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2009. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/29627.

Council of Science Editors:

Li HC. Robust peer-to-peer systems. [Doctoral Dissertation]. University of Texas – Austin; 2009. Available from: http://hdl.handle.net/2152/29627

24. Porter, Donald E. Operating system transactions.

Degree: PhD, Computer Sciences, 2010, University of Texas – Austin

 Applications must be able to synchronize accesses to operating system (OS) resources in order to ensure correctness in the face of concurrency and system failures.… (more)

Subjects/Keywords: Transactions; Operating systems; Concurrency; TxOS; Race conditions; Transactional memory; Lock-free data structures; System transactions; Linked list algorithms; Lock-free algorithm; Lock-free lists

Page 1 Page 2 Page 3 Page 4 Page 5 Sample image Sample image

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Porter, D. E. (2010). Operating system transactions. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2010-12-2488

Chicago Manual of Style (16th Edition):

Porter, Donald E. “Operating system transactions.” 2010. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/ETD-UT-2010-12-2488.

MLA Handbook (7th Edition):

Porter, Donald E. “Operating system transactions.” 2010. Web. 06 Mar 2021.

Vancouver:

Porter DE. Operating system transactions. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2010. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/ETD-UT-2010-12-2488.

Council of Science Editors:

Porter DE. Operating system transactions. [Doctoral Dissertation]. University of Texas – Austin; 2010. Available from: http://hdl.handle.net/2152/ETD-UT-2010-12-2488

25. Clement, Allen Grogan. UpRight fault tolerance.

Degree: PhD, Computer Sciences, 2010, University of Texas – Austin

 Experiences with computer systems indicate an inconvenient truth: computers fail and they fail in interesting ways. Although using redundancy to protect against fail-stop failures is… (more)

Subjects/Keywords: Fault tolerance; Dependability; Byzantine fault tolerance; UpRight fault tolerance; Replicated state machine

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Clement, A. G. (2010). UpRight fault tolerance. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2010-12-2359

Chicago Manual of Style (16th Edition):

Clement, Allen Grogan. “UpRight fault tolerance.” 2010. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/ETD-UT-2010-12-2359.

MLA Handbook (7th Edition):

Clement, Allen Grogan. “UpRight fault tolerance.” 2010. Web. 06 Mar 2021.

Vancouver:

Clement AG. UpRight fault tolerance. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2010. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/ETD-UT-2010-12-2359.

Council of Science Editors:

Clement AG. UpRight fault tolerance. [Doctoral Dissertation]. University of Texas – Austin; 2010. Available from: http://hdl.handle.net/2152/ETD-UT-2010-12-2359

26. -5508-4043. Platform-level protection for interacting mobile apps.

Degree: PhD, Computer science, 2016, University of Texas – Austin

 In a modern mobile platform, apps are mutually distrustful, but they share the same device and frequently interact with each other. This dissertation shows how… (more)

Subjects/Keywords: Operating systems; Mobile platforms; Security; Confinement

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

-5508-4043. (2016). Platform-level protection for interacting mobile apps. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/43721

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

-5508-4043. “Platform-level protection for interacting mobile apps.” 2016. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/43721.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

-5508-4043. “Platform-level protection for interacting mobile apps.” 2016. Web. 06 Mar 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

-5508-4043. Platform-level protection for interacting mobile apps. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2016. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/43721.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

-5508-4043. Platform-level protection for interacting mobile apps. [Doctoral Dissertation]. University of Texas – Austin; 2016. Available from: http://hdl.handle.net/2152/43721

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

27. Rozner, Eric John. Combatting loss in wireless networks.

Degree: PhD, Computer Science, 2011, University of Texas – Austin

 The wireless medium is lossy due to many reasons, such as signal attenuation, multi-path propagation, and collisions. Wireless losses degrade network throughput, reliability, and latency.… (more)

Subjects/Keywords: Wireless communication; Loss; 802.11; Opportunistic routing; Retransmissions; Network coding; Wi-Fi; Case study

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Rozner, E. J. (2011). Combatting loss in wireless networks. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2011-12-4558

Chicago Manual of Style (16th Edition):

Rozner, Eric John. “Combatting loss in wireless networks.” 2011. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/ETD-UT-2011-12-4558.

MLA Handbook (7th Edition):

Rozner, Eric John. “Combatting loss in wireless networks.” 2011. Web. 06 Mar 2021.

Vancouver:

Rozner EJ. Combatting loss in wireless networks. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2011. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/ETD-UT-2011-12-4558.

Council of Science Editors:

Rozner EJ. Combatting loss in wireless networks. [Doctoral Dissertation]. University of Texas – Austin; 2011. Available from: http://hdl.handle.net/2152/ETD-UT-2011-12-4558


University of Texas – Austin

28. Yin, Jian. Volume lease: a scalable cache consistency framework.

Degree: PhD, Computer Sciences, 2003, University of Texas – Austin

Subjects/Keywords: Computer architecture; Cache memory

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yin, J. (2003). Volume lease: a scalable cache consistency framework. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/1088

Chicago Manual of Style (16th Edition):

Yin, Jian. “Volume lease: a scalable cache consistency framework.” 2003. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/1088.

MLA Handbook (7th Edition):

Yin, Jian. “Volume lease: a scalable cache consistency framework.” 2003. Web. 06 Mar 2021.

Vancouver:

Yin J. Volume lease: a scalable cache consistency framework. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2003. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/1088.

Council of Science Editors:

Yin J. Volume lease: a scalable cache consistency framework. [Doctoral Dissertation]. University of Texas – Austin; 2003. Available from: http://hdl.handle.net/2152/1088


University of Texas – Austin

29. Aiyer, Amitanand S. Alternative implementations for storage and communication abstractions in distributed systems.

Degree: PhD, Computer Sciences, 2010, University of Texas – Austin

 Abstractions are widely used in building reliable distributed systems as they simplifies the task of building complex systems and aid in reasoning about them. Implementing… (more)

Subjects/Keywords: Distributed systems; Abstractions

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aiyer, A. S. (2010). Alternative implementations for storage and communication abstractions in distributed systems. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2010-08-1918

Chicago Manual of Style (16th Edition):

Aiyer, Amitanand S. “Alternative implementations for storage and communication abstractions in distributed systems.” 2010. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/ETD-UT-2010-08-1918.

MLA Handbook (7th Edition):

Aiyer, Amitanand S. “Alternative implementations for storage and communication abstractions in distributed systems.” 2010. Web. 06 Mar 2021.

Vancouver:

Aiyer AS. Alternative implementations for storage and communication abstractions in distributed systems. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2010. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/ETD-UT-2010-08-1918.

Council of Science Editors:

Aiyer AS. Alternative implementations for storage and communication abstractions in distributed systems. [Doctoral Dissertation]. University of Texas – Austin; 2010. Available from: http://hdl.handle.net/2152/ETD-UT-2010-08-1918


University of Texas – Austin

30. Norman, Alison Nicholas. Compiler-assisted staggered checkpointing.

Degree: PhD, Computer Sciences, 2010, University of Texas – Austin

 To make progress in the face of failures, long-running parallel applications need to save their state, known as a checkpoint. Unfortunately, current checkpointing techniques are… (more)

Subjects/Keywords: Supercomputing; Checkpointing; Simulator; Large-scale parallel applications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Norman, A. N. (2010). Compiler-assisted staggered checkpointing. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2010-08-1746

Chicago Manual of Style (16th Edition):

Norman, Alison Nicholas. “Compiler-assisted staggered checkpointing.” 2010. Doctoral Dissertation, University of Texas – Austin. Accessed March 06, 2021. http://hdl.handle.net/2152/ETD-UT-2010-08-1746.

MLA Handbook (7th Edition):

Norman, Alison Nicholas. “Compiler-assisted staggered checkpointing.” 2010. Web. 06 Mar 2021.

Vancouver:

Norman AN. Compiler-assisted staggered checkpointing. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2010. [cited 2021 Mar 06]. Available from: http://hdl.handle.net/2152/ETD-UT-2010-08-1746.

Council of Science Editors:

Norman AN. Compiler-assisted staggered checkpointing. [Doctoral Dissertation]. University of Texas – Austin; 2010. Available from: http://hdl.handle.net/2152/ETD-UT-2010-08-1746

.