Sciweavers

42 search results - page 3 / 9
» Combining Consistency and Confidentiality Requirements in Fi...
Sort
View
PVLDB
2010
138views more  PVLDB 2010»
13 years 5 months ago
The Case for Determinism in Database Systems
Replication is a widely used method for achieving high availability in database systems. Due to the nondeterminism inherent in traditional concurrency control schemes, however, sp...
Alexander Thomson, Daniel J. Abadi
EDBT
2008
ACM
111views Database» more  EDBT 2008»
14 years 7 months ago
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
Micro-data protection is a hot topic in the field of Statistical Disclosure Control (SDC), that has gained special interest after the disclosure of 658000 queries by the AOL searc...
Agusti Solanas, Francesc Sebé, Josep Doming...
LCN
2000
IEEE
13 years 12 months ago
Performance Impact of Data Compression on Virtual Private Network Transactions
Virtual private networks (VPNs) allow two or more parties to communicate securely over a public network. Using cryptographic algorithms and protocols, VPNs provide security servic...
John Patrick McGregor, Ruby B. Lee
KDD
1995
ACM
85views Data Mining» more  KDD 1995»
13 years 11 months ago
Estimating the Robustness of Discovered Knowledge
This paper introduces a new measurement, robustness, to measure the quality of machine-discovered knowledge from real-world databases that change over time. A piece of knowledge i...
Chun-Nan Hsu, Craig A. Knoblock
EDBT
2008
ACM
151views Database» more  EDBT 2008»
14 years 7 months ago
Decentralized managing of replication objects in massively distributed systems
Data replication is a central technique to increase availability and performance of distributed systems. While offering many advantages it also requires more effort for ensuring d...
Daniel Klan, Kai-Uwe Sattler, Katja Hose, Marcel K...