Sciweavers

1717 search results - page 180 / 344
» Data Integrity in a Distributed Storage System
Sort
View
164
Voted
COREGRID
2007
Springer
15 years 8 months ago
Co-Allocating Compute and Network Resources
Distributed applications or workflows need to access and use compute, storage and network resources simultaneously or chronologically coordinated respectively. Examples are distri...
Thomas Eickermann, Lidia Westphal, Oliver Wäl...
121
Voted
JSA
2000
116views more  JSA 2000»
15 years 2 months ago
Distributed vector architectures
Integrating processors and main memory is a promising approach to increase system performance. Such integration provides very high memory bandwidth that can be exploited efficientl...
Stefanos Kaxiras
215
Voted
VLDB
2001
ACM
168views Database» more  VLDB 2001»
16 years 2 months ago
Answering queries using views: A survey
The problem of answering queries using views is to find efficient methods of answering a query using a set of previously materialized views over the database, rather than accessin...
Alon Y. Halevy
115
Voted
DATE
2009
IEEE
135views Hardware» more  DATE 2009»
15 years 9 months ago
System-level hardware-based protection of memories against soft-errors
We present a hardware-based approach to improve the resilience of a computer system against the errors occurred in the main memory with the help of error detecting and correcting ...
Valentin Gherman, Samuel Evain, Mickael Cartron, N...
115
Voted
KDD
2003
ACM
210views Data Mining» more  KDD 2003»
16 years 3 months ago
Privacy-preserving k-means clustering over vertically partitioned data
Privacy and security concerns can prevent sharing of data, derailing data mining projects. Distributed knowledge discovery, if done correctly, can alleviate this problem. The key ...
Jaideep Vaidya, Chris Clifton