Sciweavers

1186 search results - page 188 / 238
» A New Approach to Secure Logging
Sort
View
102
Voted
EDBT
2000
ACM
15 years 4 months ago
Persistent Client-Server Database Sessions
Database systems support recovery, providing high database availability. However, database applications may lose work because of a server failure. In particular, if a database serv...
Roger S. Barga, David B. Lomet, Thomas Baby, Sanja...
224
Voted
ICDE
2009
IEEE
170views Database» more  ICDE 2009»
16 years 2 months ago
Semantics of Ranking Queries for Probabilistic Data and Expected Ranks
Abstract-- When dealing with massive quantities of data, topk queries are a powerful technique for returning only the k most relevant tuples for inspection, based on a scoring func...
Graham Cormode, Feifei Li, Ke Yi
134
Voted
BMCBI
2010
143views more  BMCBI 2010»
15 years 20 days ago
Shape based kinetic outlier detection in real-time PCR
Background: Real-time PCR has recently become the technique of choice for absolute and relative nucleic acid quantification. The gold standard quantification method in real-time P...
Davide Sisti, Michele Guescini, Marco B. L. Rocchi...
CORR
2008
Springer
121views Education» more  CORR 2008»
15 years 19 days ago
The Forgiving Tree: A Self-Healing Distributed Data Structure
We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that the following process continues for up t...
Tom Hayes, Navin Rustagi, Jared Saia, Amitabh Treh...
IDA
2011
Springer
14 years 7 months ago
A parallel, distributed algorithm for relational frequent pattern discovery from very large data sets
The amount of data produced by ubiquitous computing applications is quickly growing, due to the pervasive presence of small devices endowed with sensing, computing and communicatio...
Annalisa Appice, Michelangelo Ceci, Antonio Turi, ...