Sciweavers

35419 search results - page 68 / 7084
» How are we doing
Sort
View
138
Voted
ICDCS
2008
IEEE
15 years 10 months ago
Can We Really Recover Data if Storage Subsystem Fails?
This paper presents a theoretical and experimental study on the limitations of copy-on-write snapshots and incremental backups in terms of data recoverability. We provide mathemat...
Weijun Xiao, Qing Yang
113
Voted
ER
2007
Springer
70views Database» more  ER 2007»
15 years 9 months ago
As We May Link: A General Metamodel for Hypermedia Systems
Many hypermedia models have been proposed, including those specifically developed to model navigational aspects of web sites. But few hypermedia systems have been implemented base...
Beat Signer, Moira C. Norrie
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
15 years 4 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
COGSCI
2010
107views more  COGSCI 2010»
15 years 3 months ago
Bootstrapping the Mind: Analogical Processes and Symbol Systems
Human cognition is striking in its brilliance and its adaptability. How do we get that way? How do we move from the nearly helpless state of infants to the cognitive proficiency t...
Dedre Gentner
139
Voted
INFOCOM
2007
IEEE
15 years 9 months ago
Neighborhood Watch for Internet Routing: Can We Improve the Robustness of Internet Routing Today?
— Protecting BGP routing from errors and malice is one of the next big challenges for Internet routing. Several approaches have been proposed that attempt to capture and block ro...
Georgos Siganos, Michalis Faloutsos