Sciweavers

1465 search results - page 193 / 293
» Making database systems usable
Sort
View
125
Voted
ESORICS
2006
Springer
15 years 7 months ago
Private Information Retrieval Using Trusted Hardware
Abstract. Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impract...
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
CASCON
2006
136views Education» more  CASCON 2006»
15 years 4 months ago
Workload adaptation in autonomic DBMSs
Workload adaptation is a performance management process in which an autonomic database management system (DBMS) efficiently makes use of its resources by filtering or controlling ...
Baoning Niu, Patrick Martin, Wendy Powley, Randy H...
139
Voted
LISA
2004
15 years 4 months ago
PatchMaker: A Physical Network Patch Manager Tool
PatchMaker is a network management tool that tracks and stores descriptions of physical network patches in a database. Physical patches are cables that connect switches, patch pan...
Joseph R. Crouthamel, James M. Roberts, Christophe...
131
Voted
USENIX
2000
15 years 4 months ago
Outwit: UNIX Tool-Based Programming Meets the Windows World
The ubiquity of Windows-based desktop environments has not been matched by a corresponding emergence of tools supporting the Unix tool composition paradigm. Outwit is a suite of t...
Diomidis Spinellis
90
Voted
JCP
2007
94views more  JCP 2007»
15 years 3 months ago
Low-Complexity Analysis of Repetitive Regularities for Biometric Applications
— Presented in this paper is a joint algorithm optimization and architecture design framework for analysis of repetitive regularities. Two closely coupled algorithm optimization ...
Lei Wang, Niral Patel