Sciweavers

5220 search results - page 23 / 1044
» Changing Persistent Applications
Sort
View
130
Voted
WEA
2007
Springer
131views Algorithms» more  WEA 2007»
15 years 8 months ago
On the Cost of Persistence and Authentication in Skip Lists
We present an extensive experimental study of authenticated data structures for dictionaries and maps implemented with skip lists. We consider realizations of these data structures...
Michael T. Goodrich, Charalampos Papamanthou, Robe...
95
Voted
INAP
2005
Springer
15 years 7 months ago
Using a Logic Programming Language with Persistence and Contexts
Abstract. This article merges two approaches: one dealing with persistence for logic programs, as provided by a relational database back-end and another which addresses the issues ...
Salvador Abreu, Vítor Nogueira
118
Voted
POS
1998
Springer
15 years 6 months ago
DynamO: Dynamic Objects with Persistent Storage
In light of advances in processor and networking technology, especially the emergence of network attached disks, the traditional client-server architecture becomes suboptimal for ...
Jiong Yang, Silvia Nittel, Wei Wang 0010, Richard ...
115
Voted
VLDB
1994
ACM
115views Database» more  VLDB 1994»
15 years 6 months ago
Database Graph Views: A Practical Model to Manage Persistent Graphs
Advanced technical applications like routing systems or electrical network managementsystems introduce the need for complex manipulations of large size graphs. Efficiently support...
Alejandro Gutiérrez, Philippe Pucheral, Her...
CN
2007
96views more  CN 2007»
15 years 1 months ago
Persistent detection and recovery of state inconsistencies
Soft-state is a well established approach to designing robust network protocols and applications. However it is unclear how to apply soft-state approach to protocols that must mai...
Lan Wang, Daniel Massey, Lixia Zhang