Sciweavers

163 search results - page 23 / 33
» Dependability Properties of P2P Architectures
Sort
View
ANSOFT
2002
171views more  ANSOFT 2002»
13 years 7 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz
SIGMOD
2006
ACM
114views Database» more  SIGMOD 2006»
14 years 7 months ago
Integrating compression and execution in column-oriented database systems
Column-oriented database system architectures invite a reevaluation of how and when data in databases is compressed. Storing data in a column-oriented fashion greatly increases th...
Daniel J. Abadi, Samuel Madden, Miguel Ferreira
ASIAN
2007
Springer
157views Algorithms» more  ASIAN 2007»
14 years 1 months ago
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks
Abstract. We present a logic-based framework to evaluate the resilience of computer networks in the face of incidents, i.e., attacks from malicious intruders as well as random faul...
Elie Bursztein, Jean Goubault-Larrecq
SRDS
2005
IEEE
14 years 29 days ago
Consistent Main-Memory Database Federations under Deferred Disk Writes
Current cluster architectures provide the ideal environment to run federations of main-memory database systems (FMMDBs). In FMMDBs, data resides in the main memory of the federati...
Rodrigo Schmidt, Fernando Pedone
BLISS
2009
IEEE
13 years 8 months ago
Autonomous Physical Secret Functions and Clone-Resistant Identification
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...
Wael Adi