Sciweavers

2071 search results - page 229 / 415
» Behaviour Management in Database Applications
Sort
View
CIKM
2008
Springer
15 years 4 months ago
Data degradation: making private data less sensitive over time
Trail disclosure is the leakage of privacy sensitive data, resulting from negligence, attack or abusive scrutinization or usage of personal digital trails. To prevent trail disclo...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
HPDC
2010
IEEE
15 years 2 months ago
Software architecture definition for on-demand cloud provisioning
Cloud computing [22] is a promising paradigm for the provisioning of IT services. Cloud computing infrastructures, such as those offered by the RESERVOIR project, aim to facilitat...
Clovis Chapman, Wolfgang Emmerich, Fermín G...
145
Voted
PDCN
2004
15 years 3 months ago
Speculative prefetching of optional locks in distributed systems
We present a family of methods for speeding up distributed locks by exploiting the uneven distribution of both temporal and spatial locality of access behaviour of many applicatio...
Thomas Schöbel-Theuer
244
Voted
ICDE
2007
IEEE
187views Database» more  ICDE 2007»
16 years 3 months ago
RFID Data Processing with a Data Stream Query Language
RFID technology provides significant advantages over traditional object-tracking technology and is increasingly adopted and deployed in real applications. RFID applications genera...
Yijian Bai, Fusheng Wang, Peiya Liu, Carlo Zaniolo...
206
Voted
VLDB
2004
ACM
108views Database» more  VLDB 2004»
16 years 2 months ago
Retrospective on Aurora
This experience paper summarizes the key lessons we learned throughout the design and implementation of the Aurora stream processing engine. For the past two years, we have built f...
Hari Balakrishnan, Magdalena Balazinska, Donald Ca...