Sciweavers

2071 search results - page 229 / 415
» Behaviour Management in Database Applications
Sort
View
CIKM
2008
Springer
14 years 23 days ago
Data degradation: making private data less sensitive over time
Trail disclosure is the leakage of privacy sensitive data, resulting from negligence, attack or abusive scrutinization or usage of personal digital trails. To prevent trail disclo...
Nicolas Anciaux, Luc Bouganim, Harold van Heerde, ...
HPDC
2010
IEEE
13 years 11 months ago
Software architecture definition for on-demand cloud provisioning
Cloud computing [22] is a promising paradigm for the provisioning of IT services. Cloud computing infrastructures, such as those offered by the RESERVOIR project, aim to facilitat...
Clovis Chapman, Wolfgang Emmerich, Fermín G...
PDCN
2004
14 years 5 days ago
Speculative prefetching of optional locks in distributed systems
We present a family of methods for speeding up distributed locks by exploiting the uneven distribution of both temporal and spatial locality of access behaviour of many applicatio...
Thomas Schöbel-Theuer
ICDE
2007
IEEE
187views Database» more  ICDE 2007»
15 years 4 days ago
RFID Data Processing with a Data Stream Query Language
RFID technology provides significant advantages over traditional object-tracking technology and is increasingly adopted and deployed in real applications. RFID applications genera...
Yijian Bai, Fusheng Wang, Peiya Liu, Carlo Zaniolo...
VLDB
2004
ACM
108views Database» more  VLDB 2004»
14 years 11 months ago
Retrospective on Aurora
This experience paper summarizes the key lessons we learned throughout the design and implementation of the Aurora stream processing engine. For the past two years, we have built f...
Hari Balakrishnan, Magdalena Balazinska, Donald Ca...