Sciweavers

80 search results - page 4 / 16
» Audit logs: to keep or not to keep
Sort
View
IEEEPACT
2003
IEEE
14 years 26 days ago
Using Software Logging to Support Multi-Version Buffering in Thread-Level Speculation
In Thread-Level Speculation (TLS), speculative tasks generate memory state that cannot simply be combined with the rest of the system because it is unsafe. One way to deal with th...
María Jesús Garzarán, Milos P...
WIS
2004
13 years 9 months ago
Pruning Update Log Files in Intermittently Connected Databases
Modern databases allow mobile clients that subscribe to replicated data, to process the replica without requiring continuous connectivity, and to receive the updates while connecte...
Liton Chakraborty, Ajit Singh, Kshirasagar Naik
AICT
2006
IEEE
14 years 1 months ago
Recipient Anonymity in a Structured Overlay
An open problem in structured overlay networks is related to the anonymity to be provided to recipients, namely, those nodes who respond to request messages. Such a feature is of ...
Giuseppe Ciaccio
MSS
2007
IEEE
100views Hardware» more  MSS 2007»
14 years 1 months ago
Efficient Logging and Replication Techniques for Comprehensive Data Protection
Mariner is an iSCSI-based storage system that is de­ signed to provide comprehensive data protection on com­ modity ATA disk and Gigabit Ethernet technologies while offering the...
Maohua Lu, Shibiao Lin, Tzi-cker Chiueh
IEEEPACT
2009
IEEE
13 years 5 months ago
FASTM: A Log-based Hardware Transactional Memory with Fast Abort Recovery
Abstract--Version management, one of the key design dimensions of Hardware Transactional Memory (HTM) systems, defines where and how transactional modifications are stored. Current...
Marc Lupon, Grigorios Magklis, Antonio Gonzá...