Sciweavers

80 search results - page 13 / 16
» Audit logs: to keep or not to keep
Sort
View
IJVR
2007
85views more  IJVR 2007»
13 years 7 months ago
Detection of Landmarks for Clustering of Online-Game Players
—Understanding of player behaviors is an important issue to keep online games interesting to their players. Focusing on player movement, in our previous work, we proposed a metho...
Ruck Thawonmas, Masayoshi Kurashige, Kuan-Ta Chen
INFOCOM
2010
IEEE
13 years 6 months ago
Collaborative Measurements of Upload Speeds in P2P Systems
—In this paper, we study the theory of collaborative upload bandwidth measurement in peer-to-peer environments. A host can use a bandwidth estimation probe to determine the bandw...
John R. Douceur, James W. Mickens, Thomas Moscibro...
PVLDB
2010
122views more  PVLDB 2010»
13 years 6 months ago
Database Replication: a Tale of Research across Communities
Replication is a key mechanism to achieve scalability and fault-tolerance in databases. Its importance has recently been further increased because of the role it plays in achievin...
Bettina Kemme, Gustavo Alonso
WDAG
2005
Springer
100views Algorithms» more  WDAG 2005»
14 years 1 months ago
The Dynamic And-Or Quorum System
We investigate issues related to the probe complexity of the And-Or quorum system and its implementation in a dynamic environment. Our contribution is twofold: We first analyze th...
Uri Nadav, Moni Naor
CCS
2001
ACM
13 years 11 months ago
Efficient State Updates for Key Management
Encryption is widely used to enforce usage rules for digital content. In many scenarios content is encrypted using a group key which is known to a group of users that are allowed ...
Benny Pinkas