Sciweavers

231 search results - page 41 / 47
» Active Preservation
Sort
View

Publication
220views
16 years 9 months ago
Exploiting the Impact of Database System Configuration Parameters: A Design of Experiments Approach
Tuning database system configuration parameters to proper values according to the expected query workload plays a very important role in determining DBMS performance. However, the ...
Biplob K. Debnath, Mohamed F. Mokbel, David J. Lil...
DAC
2007
ACM
15 years 10 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
141
Voted
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
15 years 9 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
SOUPS
2009
ACM
15 years 4 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
ICDE
2007
IEEE
155views Database» more  ICDE 2007»
15 years 3 months ago
Query-Aware Sampling for Data Streams
Data Stream Management Systems are useful when large volumes of data need to be processed in real time. Examples include monitoring network traffic, monitoring financial transacti...
Theodore Johnson, S. Muthukrishnan, Vladislav Shka...