While there seems to be a general agreement that next years' systems will include many processing cores, it is often overlooked that these systems will also include an increa...
In this paper we explore database segmentation in the context of a column-store DBMS targeted at a scientific database. We present a novel hardware- and scheme-oblivious segmentati...
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Purpose – The purpose of this paper, drawing as it does on earlier research, is to provide the context for a discussion on the use of rewards and recognition programmes in knowl...
RDF-based P2P networks have a number of advantages compared with simpler P2P networks such as Napster, Gnutella or with approaches based on distributed indices such as CAN and CHO...