Sciweavers

520 search results - page 9 / 104
» Information sharing with the Oracle database
Sort
View
72
Voted
TCC
2007
Springer
93views Cryptology» more  TCC 2007»
15 years 3 months ago
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
Abstract. We construct an intrusion-resilient symmetric-key authenticated key exchange (AKE) protocol in the bounded retrieval model. The model employs a long shared private key to...
David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke L...
DAGSTUHL
2007
14 years 11 months ago
Constraint Databases and Geographic Information Systems
Constraint databases and geographic information systems share many applications. However, constraint databases can go beyond geographic information systems in efficient spatial and...
Peter Z. Revesz
SOSP
1997
ACM
14 years 11 months ago
Towards Transparent and Efficient Software Distributed Shared Memory
Despite a large research effort, software distributed shared memory systems have not been widely used to run parallel applications across clusters of computers. The higher perform...
Daniel J. Scales, Kourosh Gharachorloo
GVD
2004
113views Database» more  GVD 2004»
14 years 11 months ago
A Flexible Architecture for a Push-based P2P Database
Originally developed for file sharing, P2P concepts are predestinated to realize information sharing in a more general way. Combined with the well known concept of loosely coupled...
Cristian Pérez de Laborda, Christopher Popf...
ICDE
2008
IEEE
182views Database» more  ICDE 2008»
15 years 11 months ago
Accurate and Efficient Inter-Transaction Dependency Tracking
A reparable database management system has the ability to automatically undo the set of transactions that are corrupted by a human error or malicious attack. The key technical chal...
Tzi-cker Chiueh, Shweta Bajpai