Sciweavers

3451 search results - page 30 / 691
» Security of Backup Data
Sort
View
73
Voted
IDEAS
1997
IEEE
110views Database» more  IDEAS 1997»
15 years 1 months ago
Accommodating Logical Logging under Fuzzy Checkpointing in Main Memory Databases
This paper presents a simple and effective method to reduce the size of log data for recovery in main memory databases. Fuzzy checkpointing is known to be very efficient in main ...
Seung-Kyoon Woo, Myoung-Ho Kim, Yoon-Joon Lee
IEEEARES
2007
IEEE
15 years 4 months ago
Reliability Markov Chains for Security Data Transmitter Analysis
Security communication systems composed of highly reliable components may have few if any failures while undergoing heavy testing or field-usage. This paper combines (i) analysis ...
Calin Ciufudean, Bianca Satco, Constantin Filote
CSREASAM
2006
14 years 11 months ago
Data Security and wireless networks: mutually exclusive?
- The increased use and popularity of wireless networks has seen their adoption in medical information systems. They provide the advantages of mobility and instant information avai...
Andrew Woodward
HICSS
2011
IEEE
203views Biometrics» more  HICSS 2011»
14 years 1 months ago
Will HITECH Heal Patient Data Hemorrhages?
Hemorrhages of confidential patient health data create privacy and security concerns. While the US HIPAA legislation on privacy and security went into effect over five years ago, ...
M. Eric Johnson, Nicholas D. Willey
ESORICS
2004
Springer
15 years 3 months ago
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data
As network traffic increases, the problems associated with monitoring and analyzing the traffic on high speed networks become increasingly difficult. In this paper, we introduce a ...
John McHugh