Sciweavers

20511 search results - page 4027 / 4103
» On the level
Sort
View
PVLDB
2010
184views more  PVLDB 2010»
13 years 8 months ago
Adaptive Logging for Mobile Device
Nowadays, due to the increased user requirements of the fast and reliable data management operation for mobile applications, major device vendors use embedded DBMS for their mobil...
Young-Seok Kim, Heegyu Jin, Kyoung-Gu Woo
PVLDB
2010
167views more  PVLDB 2010»
13 years 8 months ago
The Performance of MapReduce: An In-depth Study
MapReduce has been widely used for large-scale data analysis in the Cloud. The system is well recognized for its elastic scalability and fine-grained fault tolerance although its...
Dawei Jiang, Beng Chin Ooi, Lei Shi, Sai Wu
RAID
2010
Springer
13 years 8 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
REPLICATION
2010
13 years 8 months ago
A History of the Virtual Synchrony Replication Model
In this chapter, we discuss a widely used fault-tolerant data replication model called virtual synchrony. The model responds to two kinds of needs. First, there is the practical qu...
Ken Birman
RFIDSEC
2010
13 years 8 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...
« Prev « First page 4027 / 4103 Last » Next »