ng Abstractions from Resources in a Tactical Storage System Douglas Thain† , Sander Klous∗ , Justin Wozniak† , Paul Brenner† , Aaron Striegel† , Jesus Izaguirre† † - ...
Douglas Thain, Sander Klous, Justin M. Wozniak, Pa...
The explosive growth of location-detection devices, wireless communications, and mobile databases has resulted in the realization of location-based services as commercial products...
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
We present a pipelining, dynamically usercontrollable reorder operator, for use in dataintensive applications. Allowing the user to reorder the data delivery on the fly increases...
Vijayshankar Raman, Bhaskaran Raman, Joseph M. Hel...
Managing large scale UNIX networks so that users can use resources on multiple systems is traditionally performed using NIS, NFS, and DNS. Proper use of these tools requires exact...