Sciweavers

6300 search results - page 1161 / 1260
» We have it easy, but do we have it right
Sort
View
106
Voted
OSDI
2008
ACM
16 years 1 months ago
Hardware Enforcement of Application Security Policies Using Tagged Memory
Computers are notoriously insecure, in part because application security policies do not map well onto traditional protection mechanisms such as Unix user accounts or hardware pag...
Nickolai Zeldovich, Hari Kannan, Michael Dalton, C...
206
Voted
SIGMOD
2008
ACM
139views Database» more  SIGMOD 2008»
16 years 1 months ago
Paths to stardom: calibrating the potential of a peer-based data management system
As peer-to-peer (P2P) networks become more familiar to the database community, intense interest has built up in using their scalability and resilience properties to scale database...
Mihai Lupu, Beng Chin Ooi, Y. C. Tay
SIGMOD
2008
ACM
145views Database» more  SIGMOD 2008»
16 years 1 months ago
Optimizing complex queries with multiple relation instances
Today's query processing engines do not take advantage of the multiple occurrences of a relation in a query to improve performance. Instead, each instance is treated as a dis...
Yu Cao, Gopal C. Das, Chee Yong Chan, Kian-Lee Tan
190
Voted
SIGMOD
2007
ACM
183views Database» more  SIGMOD 2007»
16 years 1 months ago
Report on the First International VLDB Workshop on Clean Databases (CleanDB 2006)
In this report, we provide a summary1 of the First Int'l VLDB Workshop on Clean Databases (CleanDB 2006), which took place at Seoul, Korea, on September 11, 2006, in conjunct...
Dongwon Lee, Chen Li
116
Voted
SIGMOD
2002
ACM
134views Database» more  SIGMOD 2002»
16 years 1 months ago
Wavelet synopses with error guarantees
Recent work has demonstrated the effectiveness of the wavelet decomposition in reducing large amounts of data to compact sets of wavelet coefficients (termed "wavelet synopse...
Minos N. Garofalakis, Phillip B. Gibbons
« Prev « First page 1161 / 1260 Last » Next »