Sciweavers

1830 search results - page 118 / 366
» Implementing a Tamper-Evident Database System
Sort
View
EUROSYS
2010
ACM
14 years 7 months ago
Otherworld - Giving Applications a Chance to Survive OS Kernel Crashes
We propose a mechanism that allows applications to survive operating system kernel crashes and continue functioning with no application data loss after a system reboot. This mecha...
Alex Depoutovitch, Michael Stumm
IRI
2003
IEEE
14 years 3 months ago
Information Reuse and System Integration in the Development of a Hurricane Simulation System
- This paper presents our effort in designing and implementing an advanced hurricane simulation system on the platform of the World Wide Web for the purpose of supporting decisiona...
Shu-Ching Chen, Shahid Hamid, Sneh Gulati, Guo Che...
KCAP
2005
ACM
14 years 3 months ago
Knowledge transformations between frame systems and RDB systems
For decades, researchers in knowledge representation (KR) have argued for and against various choices in KR formalisms, such as Rules, Frames, Semantic nets, and Formal logic. In ...
John H. Gennari, Peter Mork, Hao Li
EDBT
2012
ACM
308views Database» more  EDBT 2012»
12 years 21 days ago
Transactional stream processing
Many stream processing applications require access to a multitude of streaming as well as stored data sources. Yet there is no clear semantics for correct continuous query executi...
Irina Botan, Peter M. Fischer, Donald Kossmann, Ne...
DBISP2P
2005
Springer
131views Database» more  DBISP2P 2005»
14 years 3 months ago
Symmetric Replication for Structured Peer-to-Peer Systems
Structured peer-to-peer systems rely on replication as a basic means to provide fault-tolerance in presence of high churn. Most select replicas using either multiple hash functions...
Ali Ghodsi, Luc Onana Alima, Seif Haridi