Sciweavers

1402 search results - page 36 / 281
» Distributed Integrity Checking for Systems with Replicated D...
Sort
View
DPD
2006
141views more  DPD 2006»
15 years 3 months ago
Efficient parallel processing of range queries through replicated declustering
A common technique used to minimize I/O in data intensive applications is data declustering over parallel servers. This technique involves distributing data among several disks so...
Hakan Ferhatosmanoglu, Ali Saman Tosun, Guadalupe ...
NETGAMES
2006
ACM
15 years 9 months ago
Applying database replication to multi-player online games
Multi-player Online Games (MOGs) have emerged as popular data intensive applications in recent years. Being used by many players simultaneously, they require a high degree of faul...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
121
Voted
DOLAP
2004
ACM
15 years 8 months ago
Handling big dimensions in distributed data warehouses using the DWS technique
The DWS (Data Warehouse Striping) technique allows the distribution of large data warehouses through a cluster of computers. The data partitioning approach partition the facts tab...
Marco Costa, Henrique Madeira
128
Voted
EUROSYS
2010
ACM
15 years 8 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
SIGMOD
2008
ACM
143views Database» more  SIGMOD 2008»
16 years 3 months ago
Middleware-based database replication: the gaps between theory and practice
The need for high availability and performance in data management systems has been fueling a long running interest in database replication from both academia and industry. However...
Emmanuel Cecchet, George Candea, Anastasia Ailamak...