The most acute information management challenges today stem from organizations relying on a large number of diverse, interrelated data sources, but having no means of managing the...
Managing trust is a problem of particular importance in peer-to-peer environments where one frequently encounters unknown agents. Existing methods for trust management, that are b...
Since the 1970’s, database systems have been “compute-centric”. When a computation needs the data, it requests the data, and the data are pulled through the system. We belie...
Subi Arumugam, Alin Dobra, Christopher M. Jermaine...
In this paper we develop, implement and evaluate an approach to quickly reassign resources for a virtualized utility computing platform. The approach provides this platform agilit...
Wei Zhang, Hangwei Qian, Craig E. Wills, Michael R...
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...