Sciweavers

1391 search results - page 66 / 279
» Ensuring data integrity in storage: techniques and applicati...
Sort
View
UIST
1997
ACM
15 years 4 months ago
Pick-and-Drop: A Direct Manipulation Technique for Multiple Computer Environments
This paper proposes a new field of user interfaces called multi-computer direct manipulation and presents a pen-based direct manipulation technique that can be used for data trans...
Jun Rekimoto
FAST
2008
15 years 2 months ago
Parity Lost and Parity Regained
RAID storage systems protect data from storage errors, such as data corruption, using a set of one or more integrity techniques, such as checksums. The exact protection offered by...
Andrew Krioukov, Lakshmi N. Bairavasundaram, Garth...
SIGMOD
2009
ACM
250views Database» more  SIGMOD 2009»
16 years 2 days ago
Query processing techniques for solid state drives
Solid state drives perform random reads more than 100x faster than traditional magnetic hard disks, while offering comparable sequential read and write bandwidth. Because of their...
Dimitris Tsirogiannis, Stavros Harizopoulos, Mehul...
ICDE
2002
IEEE
91views Database» more  ICDE 2002»
15 years 4 months ago
Lossy Reduction for Very High Dimensional Data
We consider the use of data reduction techniques for the problem of approximate query answering. We focus on applications for which accurate answers to selective queries are requi...
Chris Jermaine, Edward Omiecinski
NDSS
2007
IEEE
15 years 6 months ago
Cryptographic Methods for Storing Ballots on a Voting Machine
A direct recording electronic (DRE) voting machine must satisfy several requirements to ensure voter privacy and the integrity of the election. A recent proposal for a vote storag...
John Bethencourt, Dan Boneh, Brent Waters