Sciweavers

1206 search results - page 196 / 242
» Architecture of Highly Available Databases
Sort
View
ISF
2008
114views more  ISF 2008»
13 years 10 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
WWW
2004
ACM
14 years 10 months ago
Edgecomputing: extending enterprise applications to the edge of the internet
Content delivery networks have evolved beyond traditional distributed caching. With services such as Akamai's EdgeComputing it is now possible to deploy and run enterprise bu...
Andy Davis, Jay Parikh, William E. Weihl
SIGMOD
2008
ACM
167views Database» more  SIGMOD 2008»
14 years 10 months ago
DiMaC: a system for cleaning disguised missing data
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
SIGMOD
2002
ACM
108views Database» more  SIGMOD 2002»
14 years 10 months ago
An adaptive peer-to-peer network for distributed caching of OLAP results
Peer-to-Peer (P2P) systems are becoming increasingly popular as they enable users to exchange digital information by participating in complex networks. Such systems are inexpensiv...
Panos Kalnis, Wee Siong Ng, Beng Chin Ooi, Dimitri...
ADBIS
2006
Springer
109views Database» more  ADBIS 2006»
14 years 4 months ago
Content Is Capricious: A Case for Dynamic System Generation
Abstract. Database modeling is based on the assumption of a high regularity of its application areas, an assumption which applies to both the structure of data and the behavior of ...
Hans-Werner Sehring, Sebastian Bossung, Joachim W....