Sciweavers

158 search results - page 7 / 32
» Cost of Ensuring Safety in Distributed Database Management S...
Sort
View
96
Voted
TKDE
2010
272views more  TKDE 2010»
14 years 8 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
CIKM
2011
Springer
13 years 9 months ago
On the elasticity of NoSQL databases over cloud management platforms
NoSQL databases focus on analytical processing of large scale datasets, offering increased scalability over commodity hardware. One of their strongest features is elasticity, whi...
Ioannis Konstantinou, Evangelos Angelou, Christina...
PVLDB
2010
138views more  PVLDB 2010»
14 years 8 months ago
The Case for Determinism in Database Systems
Replication is a widely used method for achieving high availability in database systems. Due to the nondeterminism inherent in traditional concurrency control schemes, however, sp...
Alexander Thomson, Daniel J. Abadi
95
Voted
IPPS
2007
IEEE
15 years 3 months ago
Adaptive Distributed Database Replication Through Colonies of Pogo Ants
We address the problem of optimizing the distribution of partially replicated databases over a computer network. Replication is used to increase data availability in the presence ...
Sarah Abdul-Wahid, Razvan Andonie, Joseph Lemley, ...
VLDB
1990
ACM
166views Database» more  VLDB 1990»
15 years 1 months ago
The Tree Quorum Protocol: An Efficient Approach for Managing Replicated Data
In this paper, we present an efficient algorithm for managing replicated data. We impose a logical tree structure on the set of copies of an object. In a failurefree environment t...
Divyakant Agrawal, Amr El Abbadi