Sciweavers

43 search results - page 7 / 9
» Architectures for Intrusion Tolerant Database Systems
Sort
View
ASPLOS
2006
ACM
14 years 1 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
SIGMOD
2010
ACM
377views Database» more  SIGMOD 2010»
14 years 22 days ago
Online aggregation and continuous query support in MapReduce
MapReduce is a popular framework for data-intensive distributed computing of batch jobs. To simplify fault tolerance, the output of each MapReduce task and job is materialized to ...
Tyson Condie, Neil Conway, Peter Alvaro, Joseph M....
ISSA
2004
13 years 9 months ago
Towards Hippocratic Log Files
The World Wide Web (WWW) is fast becoming the central location for goods, services and information. The very factors that make the Internet such a powerful medium combine to make ...
Andrew Rutherford
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
13 years 10 months ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio
PDSE
2000
116views more  PDSE 2000»
13 years 9 months ago
A CORBA-Based Architecture for Adding Dependability to Legacy Servers
This work presents a flexible, CORBA compliant Middle-Tier Server architecture which is capable of adding dependability (namely, reliability, availability, and performability) to ...
Domenico Cotroneo, Luigi Romano, Stefano Russo, Ni...