Sciweavers

5623 search results - page 1032 / 1125
» Incremental Mechanism Design
Sort
View
103
Voted
OSDI
2008
ACM
16 years 28 days ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
202
Voted
VLDB
2007
ACM
128views Database» more  VLDB 2007»
16 years 26 days ago
Automating the Detection of Snapshot Isolation Anomalies
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
193
Voted
SIGMOD
2009
ACM
157views Database» more  SIGMOD 2009»
16 years 26 days ago
Asynchronous view maintenance for VLSD databases
The query models of the recent generation of very large scale distributed (VLSD) shared-nothing data storage systems, including our own PNUTS and others (e.g. BigTable, Dynamo, Ca...
Parag Agrawal, Adam Silberstein, Brian F. Cooper, ...
169
Voted
SIGMOD
2007
ACM
124views Database» more  SIGMOD 2007»
16 years 24 days ago
Query suspend and resume
Suppose a long-running analytical query is executing on a database server and has been allocated a large amount of physical memory. A high-priority task comes in and we need to ru...
Badrish Chandramouli, Christopher N. Bond, Shivnat...
SIGMOD
2005
ACM
99views Database» more  SIGMOD 2005»
16 years 24 days ago
WOODSS and the Web: annotating and reusing scientific workflows
This paper discusses ongoing research on scientific workflows at the Institute of Computing, University of Campinas (IC - UNICAMP) Brazil. Our projects with bio-scientists have le...
Claudia Bauzer Medeiros, José de Jesús Pérez Al...
« Prev « First page 1032 / 1125 Last » Next »