Sciweavers

265 search results - page 30 / 53
» A Foolish Consistency: Technical Challenges in Consistency M...
Sort
View
ICDCS
2012
IEEE
11 years 10 months ago
Tiresias: Online Anomaly Detection for Hierarchical Operational Network Data
Operational network data, management data such as customer care call logs and equipment system logs, is a very important source of information for network operators to detect prob...
Chi-Yao Hong, Matthew Caesar, Nick G. Duffield, Ji...
DBKDA
2010
IEEE
127views Database» more  DBKDA 2010»
13 years 6 months ago
Failure-Tolerant Transaction Routing at Large Scale
—Emerging Web2.0 applications such as virtual worlds or social networking websites strongly differ from usual OLTP applications. First, the transactions are encapsulated in an AP...
Idrissa Sarr, Hubert Naacke, Stéphane Gan&c...
CCS
2007
ACM
14 years 1 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
IWMM
2007
Springer
130views Hardware» more  IWMM 2007»
14 years 1 months ago
Accordion arrays
In this work, we present accordion arrays, a straightforward and effective memory compression technique targeting Unicode-based character arrays. In many non-numeric Java programs...
Craig B. Zilles
HICSS
2006
IEEE
117views Biometrics» more  HICSS 2006»
14 years 1 months ago
Stakeholders, Contradictions and Salience: An Empirical Study of a Norwegian G2G Effort
Previous studies indicate that the expected effects of e-Government are slower to realize than initially expected. Several authors argue that e-Government involves particularly co...
Leif Skiftenes Flak, Stig Nordheim