Sciweavers

242 search results - page 37 / 49
» Cryptographic Cloud Storage
Sort
View
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 10 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
EUROSYS
2009
ACM
14 years 4 months ago
Improving the responsiveness of internet services with automatic cache placement
The backends of today’s Internet services rely heavily on caching at various layers both to provide faster service to common requests and to reduce load on back-end components. ...
Alexander Rasmussen, Emre Kiciman, V. Benjamin Liv...
DSN
2009
IEEE
14 years 2 months ago
VNsnap: Taking snapshots of virtual networked environments with minimal downtime
A virtual networked environment (VNE) consists of virtual machines (VMs) connected by a virtual network. It has been adopted to create “virtual infrastructures” for individual...
Ardalan Kangarlou, Patrick Eugster, Dongyan Xu
CIKM
2009
Springer
14 years 1 days ago
Query processing of massive trajectory data based on mapreduce
With the development of positioning technologies and the boosting deployment of inexpensive location-aware sensors, large volumes of trajectory data have emerged. However, efficie...
Qiang Ma, Bin Yang 0002, Weining Qian, Aoying Zhou
HT
2010
ACM
13 years 11 months ago
Of kings, traffic signs and flowers: exploring navigation of tagged documents
Many popular Web 2.0 sites support navigation of tagged web resources. The tag-based navigation has been described as a lightweight reorientation of view on tags and the associate...
Jacek Gwizdka