Sciweavers

334 search results - page 21 / 67
» Sybase Replication Server
Sort
View
CCS
2011
ACM
12 years 9 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
DPD
2006
141views more  DPD 2006»
13 years 9 months ago
Efficient parallel processing of range queries through replicated declustering
A common technique used to minimize I/O in data intensive applications is data declustering over parallel servers. This technique involves distributing data among several disks so...
Hakan Ferhatosmanoglu, Ali Saman Tosun, Guadalupe ...
CONEXT
2010
ACM
13 years 7 months ago
Assessing the vulnerability of replicated network services
Client-server networks are pervasive, fundamental, and include such key networks as the Internet, power grids, and road networks. In a client-server network, clients obtain a serv...
George Dean Bissias, Brian Neil Levine, Ramesh K. ...
ADBIS
2006
Springer
93views Database» more  ADBIS 2006»
14 years 3 months ago
Integrating Caching Techniques on a Content Distribution Network
Web caching and replication tune capacity with performance and they have become essential components of the Web. In practice, caching and replication techniques have been applied i...
Konstantinos Stamos, George Pallis, Athena Vakali
VLDB
1997
ACM
117views Database» more  VLDB 1997»
14 years 2 months ago
Finding Data in the Neighborhood
In this paper, we present and evaluate alternative techniques to effect the use of location-independent identiļ¬ers in distributed database systems. Location-independent identiļ¬...
André Eickler, Alfons Kemper, Donald Kossma...