Sciweavers

4343 search results - page 24 / 869
» Replication Techniques for Availability
Sort
View
ACSAC
1999
IEEE
15 years 6 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
93
Voted
ICDE
2010
IEEE
235views Database» more  ICDE 2010»
16 years 1 months ago
Cost-efficient and Differentiated Data Availability Guarantees in Data Clouds
Abstract-- Failures of any type are common in current datacenters. As data scales up, its availability becomes more complex, while different availability levels per application or ...
Nicolas Bonvin, Thanasis G. Papaioannou, Karl Aber...
95
Voted
IRI
2007
IEEE
15 years 8 months ago
An Object-Oriented Approach for High Availability of Applications Integration
The integration of networked applications, especially those requiring continuous access to shared information resources and databases, may be effected by scheduled unavailability ...
Jameela Al-Jaroodi, Nader Mohamed
148
Voted
IEEESCC
2007
IEEE
15 years 8 months ago
A Fault-Tolerant Middleware Architecture for High-Availability Storage Services
Today organizations and business enterprises of all sizes need to deal with unprecedented amounts of digital information, creating challenging demands for mass storage and on-dema...
Sangeetha Seshadri, Ling Liu, Brian F. Cooper, Law...
112
Voted
AP2PC
2005
Springer
15 years 7 months ago
Highly Available DHTs: Keeping Data Consistency After Updates
Abstract. The research in the paper is motivated by building a decentralized/P2P XML storage on top of a DHT (Distributed Hash Table). The storage must provide high data availabili...
Predrag Knezevic, Andreas Wombacher, Thomas Risse