Sciweavers

1830 search results - page 276 / 366
» Implementing a Tamper-Evident Database System
Sort
View
210
Voted
SIGMOD
2007
ACM
167views Database» more  SIGMOD 2007»
16 years 26 days ago
Data currency in replicated DHTs
Distributed Hash Tables (DHTs) provide a scalable solution for data sharing in P2P systems. To ensure high data availability, DHTs typically rely on data replication, yet without ...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
168
Voted
SIGMOD
2006
ACM
126views Database» more  SIGMOD 2006»
16 years 26 days ago
Declarative networking: language, execution and optimization
The networking and distributed systems communities have recently explored a variety of new network architectures, both for applicationlevel overlay networks, and as prototypes for...
Boon Thau Loo, Tyson Condie, Minos N. Garofalakis,...
CCS
2009
ACM
15 years 7 months ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
114
Voted
SIGUCCS
2004
ACM
15 years 6 months ago
Web-based technologies: reaching their ultimate potential on restricted budgets
Academic institutions’ dependence on web-based technologies to improve efficiency in class offerings, academic records, and office documentation is increasing at a rapid pace. T...
Salvador Báez-Franceschi, Karen Le, Diana V...
115
Voted
VLDB
2004
ACM
111views Database» more  VLDB 2004»
15 years 6 months ago
Technology Challenges in a Data Warehouse
This presentation will discuss several database technology challenges that are faced when building a data warehouse. It will touch on the challenges posed by high capacity drives ...
Ramesh Bhashyam