Sciweavers

551 search results - page 16 / 111
» Preventing existence
Sort
View
BNCOD
2004
65views Database» more  BNCOD 2004»
14 years 11 months ago
Reducing Damage Assessment Latency in Survivable Databases
Abstract. Traditional recovery mechanisms are not adequate in protecting databases from malicious attacks. A malicious transaction by virtue of writing on to the database can corru...
Indrakshi Ray, Ross M. McConnell, Monte Lunacek, V...
ICPP
2003
IEEE
15 years 2 months ago
Accurately Modeling Workload Interactions for Deploying Prefetching in Web Servers
Although Web prefetching is regarded as an effective method to improve client access performance, the associated overhead prevents it from being widely deployed. Specifically, a ...
Xin Chen, Xiaodong Zhang
WSFM
2007
Springer
15 years 3 months ago
Extending Model Checking to Data-Aware Temporal Properties of Web Services
A “data-aware” web service property is a constraint on the pattern of message exchanges of a workflow where the order of messages and their data content are interdependent. Th...
Sylvain Hallé, Roger Villemaire, Omar Cherk...
HPCA
2007
IEEE
15 years 9 months ago
A Memory-Level Parallelism Aware Fetch Policy for SMT Processors
A thread executing on a simultaneous multithreading (SMT) processor that experiences a long-latency load will eventually stall while holding execution resources. Existing long-lat...
Stijn Eyerman, Lieven Eeckhout
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
15 years 4 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung