The paper presents a primary-backup protocol to manage replicated in-memory database systems (IMDBs). The protocol exploits two features of IMDBs: coarse-grain concurrency control...
Abstract. To remain competitive, enterprises have to mesh their business processes with their customers, suppliers and business partners. Increasing collaboration includes not only...
Abstract. Internet business-to-business transactions present great challenges in merging information from different sources. In this paper we describe a project to integrate four ...
Yang Yu, Donald Hillman, Basuki Setio, Jeff Heflin
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Current networks require ad-hoc operating procedures by expert administrators to handle changes. These configuration management operations are costly and error prone. Active netwo...
Alexander V. Konstantinou, Danilo Florissi, Yechia...