Sciweavers

6181 search results - page 156 / 1237
» Transactional Cluster Computing
Sort
View
JNCA
2006
86views more  JNCA 2006»
14 years 11 months ago
Real-time data attack isolation for commercial database applications
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
Peng Liu, Hai Wang, Lunquan Li
ICB
2009
Springer
156views Biometrics» more  ICB 2009»
14 years 9 months ago
Bipartite Biotokens: Definition, Implementation, and Analysis
Abstract. Cryptographic transactions form the basis of many common security systems found throughout computer networks. Supporting these transactions with biometrics is very desira...
Walter J. Scheirer, Terrance E. Boult
CLUSTER
2007
IEEE
14 years 11 months ago
The computer as software component: A mechanism for developing and testing resource management software
— In this paper, we present an architecture that encapsulates system hardware inside a software component used for job execution and status monitoring. The development of this in...
Narayan Desai, Theron Voran, Ewing L. Lusk, Andrew...
IPPS
2010
IEEE
14 years 9 months ago
Consistency in hindsight: A fully decentralized STM algorithm
Abstract--Software transactional memory (STM) algorithms often rely on centralized components to achieve atomicity, isolation and consistency. In a distributed setting, centralized...
Annette Bieniusa, Thomas Fuhrmann
ICPR
2008
IEEE
16 years 27 days ago
Growing neural gas for temporal clustering
Conventional clustering techniques provide a static snapshot of each vector's commitment to every group. With additive datasets, however, existing methods may not be sufficie...
Isaac J. Sledge, James M. Keller