Network emulation systems are widely used to explore the behavior of network protocols and to test and evaluate protocol implementations and applications. The major problem of net...
A database application differs form regular applications in that some of its inputs may be database queries. The program will execute the queries on a database and may use any re...
We present Schism, a novel workload-aware approach for database partitioning and replication designed to improve scalability of sharednothing distributed databases. Because distri...
Carlo Curino, Yang Zhang, Evan P. C. Jones, Samuel...
What would a PKI look like if it were designed for implementability and deployability rather than strict adherence to a particular theoretical or mathematical model? This paper pr...
— Solution diversity in evolutionary multi-objective optimization is considered. Although the Pareto front is ubiquitously used for the multi-objective optimization, the method o...