Sciweavers

143 search results - page 22 / 29
» Optimizing transactions for captured memory
Sort
View
CCS
2009
ACM
14 years 2 months ago
Anonymous credentials on a standard java card
Secure identity tokens such as Electronic Identity (eID) cards are emerging everywhere. At the same time usercentric identity management gains acceptance. Anonymous credential sch...
Patrik Bichsel, Jan Camenisch, Thomas Groß, ...
COOPIS
2002
IEEE
14 years 15 days ago
Parallel Processing with Autonomous Databases in a Cluster System
Abstract. We consider the use of a cluster system for Application Service Provider (ASP). In the ASP context, hosted applications and databases can be update-intensive and must rem...
Stéphane Gançarski, Hubert Naacke, E...
EXPCS
2007
13 years 11 months ago
Analysis of input-dependent program behavior using active profiling
Utility programs, which perform similar and largely independent operations on a sequence of inputs, include such common applications as compilers, interpreters, and document parse...
Xipeng Shen, Michael L. Scott, Chengliang Zhang, S...
ISCA
2003
IEEE
88views Hardware» more  ISCA 2003»
14 years 24 days ago
Phase Tracking and Prediction
In a single second a modern processor can execute billions of instructions. Obtaining a bird’s eye view of the behavior of a program at these speeds can be a difficult task whe...
Timothy Sherwood, Suleyman Sair, Brad Calder
SIGMOD
2012
ACM
253views Database» more  SIGMOD 2012»
11 years 10 months ago
Skew-aware automatic database partitioning in shared-nothing, parallel OLTP systems
The advent of affordable, shared-nothing computing systems portends a new class of parallel database management systems (DBMS) for on-line transaction processing (OLTP) applicatio...
Andrew Pavlo, Carlo Curino, Stanley B. Zdonik