Sciweavers

1402 search results - page 119 / 281
» Distributed Integrity Checking for Systems with Replicated D...
Sort
View
145
Voted
ACSAC
1999
IEEE
15 years 8 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
112
Voted
WETICE
1999
IEEE
15 years 8 months ago
A Concept for Supporting the Formation of Virtual Corporations through Negotiation
This paper describes a system that supports software development processes in virtual software corporations. A virtual software corporation consists of a set of enterprises that c...
Boris Kötting, Frank Maurer
114
Voted
ICDE
2006
IEEE
147views Database» more  ICDE 2006»
15 years 9 months ago
Distributing Google
We consider the problem of wide-area large-scale text search over a peer-to-peer infrastructure. A wide-area search infrastructure with billions of documents and millions of searc...
Vijay Gopalakrishnan, Bobby Bhattacharjee, Peter J...
191
Voted
ISSADS
2005
Springer
15 years 9 months ago
Database System Architecture - A Walk Through Time: From Centralized Platform to Mobile Computing - Keynote Address
Classical distributed database systems monolithically offer distribution transparency and higher performance. This is made possible by making data available and closer to the appl...
Ali R. Hurson, Yu Jiao
133
Voted
OOPSLA
1989
Springer
15 years 7 months ago
Static Type Inference for Parametric Classes
Method inheritance and data abstraction are central features of objectoriented programming that are attained through a hierarchical organization of classes. Recent studies have sh...
Atsushi Ohori, Peter Buneman