Sciweavers

35 search results - page 3 / 7
» Characterization of Hierarchies and Some Operators in OLAP E...
Sort
View
SRDS
1999
IEEE
13 years 10 months ago
On Diffusing Updates in a Byzantine Environment
We study how to efficiently diffuse updates to a large distributed system of data replicas, some of which may exhibit arbitrary (Byzantine) failures. We assume that strictly fewer...
Dahlia Malkhi, Yishay Mansour, Michael K. Reiter
MOBIDE
1999
ACM
13 years 10 months ago
Data Warehousing Alternatives for Mobile Environments
With rapid advancement in technology, mobile devices are increasingly becoming the norm. These devices are characterized by their need to operate even when they are disconnected f...
Ioana Stanoi, Divyakant Agrawal, Amr El Abbadi, Sh...
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 5 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
ASPLOS
2004
ACM
13 years 11 months ago
Deconstructing storage arrays
We introduce Shear, a user-level software tool that characterizes RAID storage arrays. Shear employs a set of controlled algorithms combined with statistical techniques to automat...
Timothy E. Denehy, John Bent, Florentina I. Popovi...
CCS
2009
ACM
14 years 6 months ago
A conceptual framework for Group-Centric secure information sharing
In this paper, we propose a conceptual framework for developing a family of models for Group-Centric information sharing. The traditional approach to information sharing, characte...
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William...