Sciweavers

329 search results - page 42 / 66
» The Dangers of Replication and a Solution
Sort
View
JSA
2002
125views more  JSA 2002»
15 years 1 months ago
Building a dependable system from a legacy application with CORBA
This paper presents a dependability oriented, fault tolerance based system design, development, and deployment approach. The approach relies on an architectural framework, which a...
Domenico Cotroneo, Nicola Mazzocca, Luigi Romano, ...
MONET
2002
95views more  MONET 2002»
15 years 1 months ago
On Improving the Performance of Cache Invalidation in Mobile Environments
Many cache management schemes designed for mobile environments are based on invalidation reports (IRs). However, IR-based approach suffers from long query latency and it cannot eff...
Guohong Cao

Publication
815views
14 years 9 months ago
Activity Understanding and Unusual Event Detection in Surveillance Videos
Computer scientists have made ceaseless efforts to replicate cognitive video understanding abilities of human brains onto autonomous vision systems. As video surveillance cameras ...
Chen Change Loy
EDBT
2008
ACM
156views Database» more  EDBT 2008»
16 years 1 months ago
Online recovery in cluster databases
Cluster based replication solutions are an attractive mechanism to provide both high-availability and scalability for the database backend within the multi-tier information system...
WeiBin Liang, Bettina Kemme
SIGECOM
1999
ACM
105views ECommerce» more  SIGECOM 1999»
15 years 6 months ago
Nark: receiver-based multicast non-repudiation and key management
The goal of this work is to separately control individual secure sessions between unlimited pairs of multicast receivers and senders while preserving the scalability of receiver i...
Bob Briscoe, Ian Fairman