Sciweavers

97 search results - page 12 / 20
» How to scale transactional storage systems
Sort
View
SIGMOD
2007
ACM
166views Database» more  SIGMOD 2007»
14 years 7 months ago
Threats to privacy in the forensic analysis of database systems
The use of any modern computer system leaves unintended traces of expired data and remnants of users' past activities. In this paper, we investigate the unintended persistenc...
Patrick Stahlberg, Gerome Miklau, Brian Neil Levin...
HICSS
2003
IEEE
153views Biometrics» more  HICSS 2003»
14 years 25 days ago
Balancing Safety Against Performance: Tradeoffs in Internet Security
All Internet-accessible computing systems are currently faced with incessant threats ranging from simple scriptkiddies to highly sophisticated criminal enterprises. In response to...
Vu A. Ha, David J. Musliner
MSS
2000
IEEE
119views Hardware» more  MSS 2000»
13 years 12 months ago
Implementing Journaling in a Linux Shared Disk File System
In computer systems today, speed and responsiveness is often determined by network and storage subsystem performance. Faster, more scalable networking interfaces like Fibre Channe...
Kenneth W. Preslan, Andrew P. Barry, Jonathan Bras...
WWW
2008
ACM
14 years 8 months ago
Service-oriented data denormalization for scalable web applications
Many techniques have been proposed to scale web applications. However, the data interdependencies between the database queries and transactions issued by the applications limit th...
Zhou Wei, Dejun Jiang, Guillaume Pierre, Chi-Hung ...
JMLR
2010
156views more  JMLR 2010»
13 years 2 months ago
Collaborative Filtering on a Budget
Matrix factorization is a successful technique for building collaborative filtering systems. While it works well on a large range of problems, it is also known for requiring signi...
Alexandros Karatzoglou, Alexander J. Smola, Markus...