Sciweavers

5344 search results - page 424 / 1069
» Privacy-Preserving Set Operations
Sort
View
130
Voted
OSDI
2004
ACM
16 years 5 months ago
Middleboxes No Longer Considered Harmful
Intermediate network elements, such as network address translators (NATs), firewalls, and transparent caches are now commonplace. The usual reaction in the network architecture co...
Michael Walfish, Jeremy Stribling, Maxwell N. Kroh...
OSDI
2002
ACM
16 years 5 months ago
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
Farsite is a secure, scalable file system that logically functions as a centralized file server but is physically distributed among a set of untrusted computers. Farsite provides ...
Atul Adya, William J. Bolosky, Miguel Castro, Gera...
OSDI
2002
ACM
16 years 5 months ago
Ivy: A Read/Write Peer-to-Peer File System
Ivy is a multi-user read/write peer-to-peer file system. Ivy has no centralized or dedicated components, and it provides useful integrity properties without requiring users to ful...
Athicha Muthitacharoen, Robert Morris, Thomer M. G...
VLDB
2003
ACM
115views Database» more  VLDB 2003»
16 years 5 months ago
Lineage tracing for general data warehouse transformations
Data warehousing systems integrate information from operational data sources into a central repository to enable analysis and mining of the integrated information. During the integ...
Yingwei Cui, Jennifer Widom
VLDB
2007
ACM
195views Database» more  VLDB 2007»
16 years 5 months ago
Modeling and Querying Vague Spatial Objects Using Shapelets
Research in modeling and querying spatial data has primarily focused on traditional "crisp" spatial objects with exact location and spatial extent. More recent work, how...
Daniel Zinn, Jim Bosch, Michael Gertz