This paper proposes an application-transparent, low-overhead checkpointing strategy for maintaining consistency of control structures in a commercial main memory database (MMDB) sy...
Long Wang, Zbigniew Kalbarczyk, Ravishankar K. Iye...
— There are several types of processes which can be modeled explicitly by recording the interactions between a set of actors over time. In such applications, a common objective i...
In this paper, we propose PriMa (Privacy Manager), a privacy protection mechanism which supports semi-automated generation of access rules for users’ profile information. PriMa...
Anna Cinzia Squicciarini, Federica Paci, Smitha Su...
In this paper, a new optimal policy is introduced to determine, adapt, and protect the Generalized MultiProtocol Label Switching (GMPLS) network topology based on the current traf...
—When constructing an unstructured P2P topology, one should consider the application running on top of it in order to achieve a good performance for the whole P2P system. It is n...