Sciweavers

293 search results - page 57 / 59
» Value-at-Risk in IT Services Contracts
Sort
View
ICDE
2007
IEEE
133views Database» more  ICDE 2007»
16 years 5 months ago
Preference-Aware Query and Update Scheduling in Web-databases
Typical web-database systems receive read-only queries, that generate dynamic web pages as a response, and writeonly updates, that keep information up-to-date. Users expect short ...
Huiming Qu, Alexandros Labrinidis
VLDB
2006
ACM
138views Database» more  VLDB 2006»
16 years 4 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah
SPAA
2009
ACM
16 years 1 months ago
A randomized, o(log w)-depth 2 smoothing network
A K-smoothing network is a distributed, low-contention data structure where tokens arrive arbitrarily on w input wires and reach w output wires via their completely asynchronous p...
Marios Mavronicolas, Thomas Sauerwald
SAC
2009
ACM
15 years 11 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
ISORC
2009
IEEE
15 years 11 months ago
Component Based Middleware-Synthesis for AUTOSAR Basic Software
Distributed real-time automotive embedded systems have to be highly dependable as well as cost-efficient due to the large number of manufactured units. To close the gap between r...
Dietmar Schreiner, Markus Schordan, Karl M. Gö...