Sciweavers

TKDE
2002
67views more  TKDE 2002»
13 years 4 months ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu
TKDE
2002
104views more  TKDE 2002»
13 years 4 months ago
The Presumed-Either Two-Phase Commit Protocol
This paper describes the presumed-either two-phase commit protocol. Presumed-either exploits log piggybacking to reduce the cost of committing transactions. If timely piggybacking ...
Gopi K. Attaluri, Kenneth Salem
TKDE
2002
71views more  TKDE 2002»
13 years 4 months ago
Finding Localized Associations in Market Basket Data
Charu C. Aggarwal, Cecilia Magdalena Procopiuc, Ph...
TKDE
2002
85views more  TKDE 2002»
13 years 4 months ago
A Content-Based Authorization Model for Digital Libraries
Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino...