Sciweavers

15 search results - page 2 / 3
» Transaction Rate Limiters for Peer-to-Peer Systems
Sort
View
ICDCS
2008
IEEE
13 years 11 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
SIGMETRICS
2009
ACM
126views Hardware» more  SIGMETRICS 2009»
13 years 11 months ago
Self-adaptive admission control policies for resource-sharing systems
We consider the problem of admission control in resource sharing systems, such as web servers and transaction processing systems, when the job size distribution has high variabili...
Varun Gupta, Mor Harchol-Balter
ICDE
2004
IEEE
151views Database» more  ICDE 2004»
14 years 6 months ago
Benchmarking SAP R/3 Archiving Scenarios
According to a survey of the University of Berkeley [6], about 5 Exabytes of new information has been created in 2002. This information explosion affects also the database volumes...
Bernhard Zeller, Alfons Kemper
DEBU
2010
152views more  DEBU 2010»
13 years 2 months ago
Implementing an Append-Only Interface for Semiconductor Storage
Solid-state disks are currently based on NAND flash and expose a standard disk interface. To accommodate limitations of the medium, solid-state disk implementations avoid rewritin...
Colin W. Reid, Philip A. Bernstein
ICETE
2004
204views Business» more  ICETE 2004»
13 years 6 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson