In this paper, we study query processing in a distributed text database. The novelty is a real distributed architecture implementation that offers concurrent query service. The di...
Claudine Santos Badue, Ricardo A. Baeza-Yates, Ber...
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...
Peer-to-peer networks have been commonly used for tasks such as file sharing or file distribution. We study a class of cooperative file distribution systems where a file is br...
Ernst W. Biersack, Damiano Carra, Renato Lo Cigno,...
Distributed applications using file sharing and file replication, conferencing, and delivery in multimedia systems often need to use the semantics of causal multicast. Causal mult...
The Windows 2000 operating system brought considerable changes to the capabilities and configuration options of the I/O subsystem over those available with the Windows NT operatin...