Sciweavers

3451 search results - page 138 / 691
» Security of Backup Data
Sort
View
MAM
2007
127views more  MAM 2007»
15 years 4 months ago
Indoor solar energy harvesting for sensor network router nodes
A unique method has been developed to scavenge solar energy from monocrystalline solar cells to power wireless router nodes that are used in indoor applications. This method elimi...
Abhiman Hande, Todd Polk, William Walker, Dinesh B...
SIGMOD
2011
ACM
331views Database» more  SIGMOD 2011»
14 years 7 months ago
Query optimization techniques for partitioned tables
Table partitioning splits a table into smaller parts that can be accessed, stored, and maintained independent of one another. From their traditional use in improving query perform...
Herodotos Herodotou, Nedyalko Borisov, Shivnath Ba...
205
Voted
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
13 years 12 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa
EDBT
2012
ACM
246views Database» more  EDBT 2012»
13 years 6 months ago
"Cut me some slack": latency-aware live migration for databases
Cloud-based data management platforms often employ multitenant databases, where service providers achieve economies of scale by consolidating multiple tenants on shared servers. I...
Sean Kenneth Barker, Yun Chi, Hyun Jin Moon, Hakan...
SDM
2004
SIAM
242views Data Mining» more  SDM 2004»
15 years 5 months ago
Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification
Multivariate statistical analysis is an important data analysis technique that has found applications in various areas. In this paper, we study some multivariate statistical analy...
Wenliang Du, Yunghsiang S. Han, Shigang Chen