Sciweavers

666 search results - page 86 / 134
» A Persistent Hyper-Programming System
Sort
View
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 10 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
ACSAC
2004
IEEE
14 years 2 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
ICDE
2004
IEEE
119views Database» more  ICDE 2004»
14 years 11 months ago
Improving Logging and Recovery Performance in Phoenix/App
Phoenix/App supports software components whose states are made persistent across a system crash via redo recovery, replaying logged interactions. Our initial prototype force logge...
Roger S. Barga, Shimin Chen, David B. Lomet
SIGMOD
2007
ACM
159views Database» more  SIGMOD 2007»
14 years 10 months ago
Anatomy of the ADO.NET entity framework
Traditional client-server applications relegate query and persistence operations on their data to database systems. The database system operates on data in the form of rows and ta...
Atul Adya, José A. Blakeley, S. Muralidhar,...
HICSS
2010
IEEE
170views Biometrics» more  HICSS 2010»
14 years 5 months ago
Artifacts as Instant Messaging Buddies
Interpersonal awareness is one person’s up-to-the moment knowledge about other group members, while artifact awareness is one person’s up-to-the-moment knowledge about other g...
Saul Greenberg, Stephen Voida, Nathan Stehr, Kimbe...