Sciweavers

1830 search results - page 224 / 366
» Implementing a Tamper-Evident Database System
Sort
View
KES
2008
Springer
15 years 2 months ago
Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Data Base
Privacy is one of the most important properties of an information system must satisfy. In which systems the need to share information among different, not trusted entities, the pro...
Mahmoud Hussein, Ashraf El-Sisi, Nabil A. Ismail
126
Voted
PVLDB
2010
150views more  PVLDB 2010»
15 years 2 months ago
DataGarage: Warehousing Massive Performance Data on Commodity Servers
Contemporary datacenters house tens of thousands of servers. The servers are closely monitored for operating conditions and utilizations by collecting their performance data (e.g....
Charles Loboz, Slawek Smyl, Suman Nath
162
Voted
CCGRID
2010
IEEE
14 years 7 months ago
WORKEM: Representing and Emulating Distributed Scientific Workflow Execution State
- Scientific workflows have become an integral part of cyberinfrastructure as their computational complexity and data sizes have grown. However, the complexity of the distributed i...
Lavanya Ramakrishnan, Dennis Gannon, Beth Plale
ICDE
1999
IEEE
105views Database» more  ICDE 1999»
16 years 5 months ago
Scheduling and Data Replication to Improve Tape Jukebox Performance
An increasing number of database applications require online access to massive amounts of data. Since large-scale storage systems implemented entirely on magnetic disk can be impr...
Bruce Hillyer, Rajeev Rastogi, Abraham Silberschat...
WWW
2007
ACM
16 years 4 months ago
Towards Deeper Understanding of the Search Interfaces of the Deep Web
Many databases have become Web-accessible through form-based search interfaces (i.e., HTML forms) that allow users to specify complex and precise queries to access the underlying ...
Hai He, Weiyi Meng, Yiyao Lu, Clement T. Yu, Zongh...