Sciweavers

1391 search results - page 20 / 279
» Ensuring data integrity in storage: techniques and applicati...
Sort
View
IAT
2006
IEEE
15 years 5 months ago
Mobile Agent Architecture Integration for a Wireless Sensor Medical Application
Wireless sensor nodes are used to monitor patient vital signs in a medical application. To ensure proper patient care is provided, real-time patient data must be managed correctly...
John Herbert, John O'Donoghue, Gao Ling, Kai Fei, ...
ICAC
2008
IEEE
15 years 6 months ago
1000 Islands: Integrated Capacity and Workload Management for the Next Generation Data Center
Recent advances in hardware and software virtualization offer unprecedented management capabilities for the mapping of virtual resources to physical resources. It is highly desira...
Xiaoyun Zhu, Donald Young, Brian J. Watson, Zhikui...
ACSAC
2006
IEEE
15 years 5 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
ICICS
2007
Springer
15 years 3 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
ADBIS
2009
Springer
210views Database» more  ADBIS 2009»
15 years 4 months ago
Performance Driven Database Design for Scalable Web Applications
Scaling up web applications requires distribution of load across multiple application servers and across multiple database servers. Distributing load across multiple application se...
Jozsef Patvarczki, Murali Mani, Neil T. Heffernan