Sciweavers

808 search results - page 95 / 162
» Distributed Anonymization: Achieving Privacy for Both Data S...
Sort
View
ICPP
2009
IEEE
14 years 2 months ago
Exploring the Cost-Availability Tradeoff in P2P Storage Systems
—P2P storage systems use replication to provide a certain level of availability. While the system must generate new replicas to replace replicas lost to permanent failures, it ca...
Zhi Yang, Yafei Dai, Zhen Xiao
ICDCS
2008
IEEE
14 years 2 months ago
Strong WORM
We introduce a Write-Once Read-Many (WORM) storage system providing strong assurances of data retention and compliant migration, by leveraging trusted secure hardware in close dat...
Radu Sion
OOPSLA
2004
Springer
14 years 1 months ago
Resolving feature convolution in middleware systems
Middleware provides simplicity and uniformity for the development of distributed applications. However, the modularity of the architecture of middleware is starting to disintegrat...
Charles Zhang, Hans-Arno Jacobsen
PODS
2010
ACM
173views Database» more  PODS 2010»
14 years 26 days ago
Foundations of schema mapping management
In the last few years, a lot of attention has been paid to the specification and subsequent manipulation of schema mappings, a problem which is of fundamental importance in metad...
Marcelo Arenas, Jorge Pérez, Juan L. Reutte...
PODC
1990
ACM
13 years 12 months ago
Sharing Memory Robustly in Message-Passing Systems
Emulators that translate algorithms from the shared-memory model to two different message-passing models are presented. Both are achieved by implementing a wait-free, atomic, singl...
Hagit Attiya, Amotz Bar-Noy, Danny Dolev