Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
This paper presents the adaptation model used in NUCLEO, a pilot e-learning environment that is currently being developed at the Complutense University of Madrid. The NUCLEO syste...
Abstract. The performance of multi-tier systems is known to be significantly degraded by workloads that place bursty service demands on system resources. Burstiness can cause queu...
Giuliano Casale, Amir Kalbasi, Diwakar Krishnamurt...
—Video-on-Demand (VoD) services have attracted a lot of attentions in recent years. Measurement studies show that VCR (Video Cassette Recorder) operations, such as pause, rewind,...
: Optimizers in modern DBMSs utilize a cost model to choose an efficient query execution plan (QEP) among all possible ones for a given query. The accuracy of the cost estimates de...
Stephan Ewen, Michael Ortega-Binderberger, Volker ...