Sciweavers

163 search results - page 23 / 33
» Dependability Properties of P2P Architectures
Sort
View
ANSOFT
2002
171views more  ANSOFT 2002»
14 years 9 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz
SIGMOD
2006
ACM
114views Database» more  SIGMOD 2006»
15 years 9 months ago
Integrating compression and execution in column-oriented database systems
Column-oriented database system architectures invite a reevaluation of how and when data in databases is compressed. Storing data in a column-oriented fashion greatly increases th...
Daniel J. Abadi, Samuel Madden, Miguel Ferreira
ASIAN
2007
Springer
157views Algorithms» more  ASIAN 2007»
15 years 3 months ago
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks
Abstract. We present a logic-based framework to evaluate the resilience of computer networks in the face of incidents, i.e., attacks from malicious intruders as well as random faul...
Elie Bursztein, Jean Goubault-Larrecq
SRDS
2005
IEEE
15 years 3 months ago
Consistent Main-Memory Database Federations under Deferred Disk Writes
Current cluster architectures provide the ideal environment to run federations of main-memory database systems (FMMDBs). In FMMDBs, data resides in the main memory of the federati...
Rodrigo Schmidt, Fernando Pedone
BLISS
2009
IEEE
14 years 10 months ago
Autonomous Physical Secret Functions and Clone-Resistant Identification
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...
Wael Adi