Sciweavers

3451 search results - page 28 / 691
» Security of Backup Data
Sort
View
ICPADS
2005
IEEE
15 years 3 months ago
An Adaptive Multiparty Protocol for Secure Data Protection
To better protect information systems, computation time data protection needs to be considered such that even when the system is partially compromised, the security of the system ...
Qingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui T...
LISA
2007
15 years 8 hour ago
Policy-Driven Management of Data Sets
Contemporary storage systems separate the management of data from the management of the underlying physical storage media used to store that data. This separation is artificial an...
Jim Holl, Kostadis Roussos, Jim Voll
ICDE
2011
IEEE
235views Database» more  ICDE 2011»
14 years 1 months ago
Dealing proactively with data corruption: Challenges and opportunities
—The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of th...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
VLDB
1998
ACM
120views Database» more  VLDB 1998»
15 years 1 months ago
KODA - The Architecture And Interface of a Data Model Independent Kernel
In this paper we describe the architecture and interface of KODA, a production strength database kernel. KODA is unique in the industry in its ability to support two different dat...
Gopalan Arun, Ashok Joshi
BMCBI
2005
109views more  BMCBI 2005»
14 years 9 months ago
Automation of gene assignments to metabolic pathways using high-throughput expression data
Background: Accurate assignment of genes to pathways is essential in order to understand the functional role of genes and to map the existing pathways in a given genome. Existing ...
Liviu Popescu, Golan Yona