Sciweavers

439 search results - page 68 / 88
» Tabling for transaction logic
Sort
View
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
15 years 12 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
SIGMOD
2004
ACM
262views Database» more  SIGMOD 2004»
15 years 12 months ago
The Next Database Revolution
Database system architectures are undergoing revolutionary changes. Most importantly, algorithms and data are being unified by integrating programming languages with the database ...
Jim Gray
97
Voted
IPPS
2007
IEEE
15 years 6 months ago
Performance Studies of a WebSphere Application, Trade, in Scale-out and Scale-up Environments
Scale-out approach, in contrast to scale-up approach (exploring increasing performance by utilizing more powerful shared-memory servers), refers to deployment of applications on a...
Hao Yu, José E. Moreira, Parijat Dube, I-Hs...
IPPS
2006
IEEE
15 years 5 months ago
Trust overlay networks for global reputation aggregation in P2P grid computing
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...
Runfang Zhou, Kai Hwang
EDO
2005
Springer
15 years 5 months ago
Experiences in coverage testing of a Java middleware
This paper addresses the issues of test coverage analysis of J2EE servers. These middleware are nowadays at the core of the modern information technology’s landscape. They provi...
Mehdi Kessis, Yves Ledru, Gérard Vandome