Sciweavers

3361 search results - page 19 / 673
» An Approach of Performance Evaluation in Authentic Database ...
Sort
View
DAGSTUHL
1998
14 years 10 months ago
A Practical Approach to Hypothetical Database Queries
Hypothetical queries are queries embedding hypotheses about the database. The embedded hypothesis in a hypothetical query indicates, so to say, a state of the database intended for...
Henning Christiansen, Troels Andreasen
ICDT
1999
ACM
99views Database» more  ICDT 1999»
15 years 1 months ago
Increasing the Expressiveness of Analytical Performance Models for Replicated Databases
The vast number of design options in replicated databases requires efficient analytical performance evaluations so that the considerable overhead of simulations or measurements can...
Matthias Nicola, Matthias Jarke
ISI
2005
Springer
15 years 3 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
SASN
2003
ACM
15 years 2 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
GIS
2009
ACM
14 years 7 months ago
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users
We propose a location-based query anonymization technique, LBS (k,T)-anonymization, that ensures anonymity of user's query in a specific time window against what we call know...
Amirreza Masoumzadeh, James Joshi, Hassan A. Karim...