Sciweavers

1636 search results - page 96 / 328
» Managing Distributed Applications Using Gush
Sort
View
119
Voted
ISORC
2003
IEEE
15 years 9 months ago
Metrics and Models for Cost and Quality of Component-Based Software
Quality and risk concerns currently limit the application of commercial off-the-shelf (COTS) software components to non-critical applications. Software metrics can quantify factor...
Sahra Sedigh-Ali, Arif Ghafoor, Raymond A. Paul
117
Voted
CIDR
2003
145views Algorithms» more  CIDR 2003»
15 years 5 months ago
Distributed Computing with BEA WebLogic Server
This paper surveys distributed computing techniques used in the implementation of BEA WebLogic Server. It discusses how application servers provide a distributed transactional inf...
Dean Jacobs
SIGMOD
2010
ACM
236views Database» more  SIGMOD 2010»
15 years 8 months ago
Differentially private aggregation of distributed time-series with transformation and encryption
We propose PASTE, the first differentially private aggregation algorithms for distributed time-series data that offer good practical utility without any trusted server. PASTE add...
Vibhor Rastogi, Suman Nath
128
Voted
SAC
2006
ACM
15 years 9 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
VLDB
2004
ACM
245views Database» more  VLDB 2004»
15 years 9 months ago
A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems
Mandatory Access Control (MAC) implementations in Relational Database Management Systems (RDBMS) have focused solely on Multilevel Security (MLS). MLS has posed a number of challe...
Walid Rjaibi, Paul Bird