Sciweavers

49 search results - page 1 / 10
» Aether: A Scalable Approach to Logging
Sort
View
PVLDB
2010
139views more  PVLDB 2010»
13 years 3 months ago
Aether: A Scalable Approach to Logging
The shift to multi-core hardware brings new challenges to database systems, as the software parallelism determines performance. Even though database systems traditionally accommod...
Ryan Johnson, Ippokratis Pandis, Radu Stoica, Mano...
EDBT
2012
ACM
225views Database» more  EDBT 2012»
11 years 7 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
TPDS
2008
133views more  TPDS 2008»
13 years 4 months ago
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking
Tracing IP packets back to their origins is an important step in defending the Internet against denial-of-service (DoS) attacks. Two kinds of IP traceback techniques have been prop...
Chao Gong, Kamil Saraç
CORR
2010
Springer
236views Education» more  CORR 2010»
12 years 11 months ago
Precise, Scalable and Online Request Tracing for Multi-tier Services of Black Boxes
As more and more multi-tier services are developed from commercial off-the-shelf components or heterogeneous middleware without source code available, both developers and administr...
Bo Sang, Jianfeng Zhan, Zhihong Zhang, Lei Wang, D...
PVM
2010
Springer
13 years 3 months ago
Dodging the Cost of Unavoidable Memory Copies in Message Logging Protocols
Abstract. With the number of computing elements spiraling to hundred of thousands in modern HPC systems, failures are common events. Few applications are nevertheless fault toleran...
George Bosilca, Aurelien Bouteiller, Thomas H&eacu...